Okta's support case management system was breached by a threat actor using stolen credentials. Watch as CyberArk resident experts, Khizar Sultan and Andy Thompson, deconstruct the events of this breach and share strategies organizations can take to mitigate the risks of identity attacks using strong security processes and operational procedures.
Recommended for You

This white paper explains how CyberArk Identity Security solutions can help you: • Achieve the key controls in the revised GL20 guidelines. • Secure all identities across all IT systems improving over

In Columbus, Georgia, the team at Aflac's Information Technology Center works tirelessly to protect their customers from potential threats.

CyberArk experts discuss why you need a battle-tested PAM solution.

Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

Expert insights and strategies to help you implement security controls that cover all types of identities.

Explore CyberArk PAM SH V14’s new features: Increased risk reduction, SAML for PSM for SSH sessions, advanced threat analytics and improved mobile experience.

90 Identity Security Best Practices in three categories: Risk Mitigation Controls, Risk Mitigation Processes, and People & Communication.

Join ESG, Red Hat, and CyberArk to learn best practices and insights to fortify your Linux infrastructure.

In this webinar, ideal for IT security pros and leaders, learn how to take your Identity Management practices from foundational to exceptional.

Learn how to meet identity security compliance t to secure your critical data in an AWS cloud environment.

This ESG eBook details how identity & access management has evolved in recent years and what you can do to bolster your identity security.

CyberArk DPA adds Sydney data center, offering improved RDP connections with robust account policies, simplified TLS support and enhanced SSH audit on Linux.

Learn how to build a cloud identity security strategy with a three-phased approach to ensure cloud compliance with relevant industry regulations.

Learn how intelligent privilege controls can help secure workforce access in complex IT environments where anyone can become a privileged user.

Learn how CyberArk’s Insight to Action framework can help secure multi-cloud environments and mitigate risk.

Learn key considerations for success in implementing passwordless authentication for enterprises.

The CyberArk Identity 23.11 release includes extended passwordless authentication capabilities with passkeys, setting stronger controls for user sessions and scheduling access termination.
Encova embraces digital transformation allowing their business to reinvent its identity access management strategy with CyberArk being at the core.

This video highlights how to launch an AWS workspace instance with the CyberArk Endpoint Privilege Manager preinstalled and configured to reduce risk on Desktop as a Service (DaaS) instances.
A top insurance company makes a digital transformation and secures mission-critical applications running on Red Hat OpenShift using CyberArk Application Access Manager’s secrets management solution.