Ransomware Protection

  • Scattered Spider Tactics Revealed45:55

    Scattered Spider Tactics Revealed

    CyberArk experts uncover Scattered Spider’s latest identity attacks and review how to detect threats and defend against privilege abuse.

    Watch Video
  • Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

    Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats

    Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the...

    Read Blog
  • API Keys and What Makes Them Vulnerable

    API Keys and What Makes Them Vulnerable

    API keys are essential for securing application access, but when hard coded, reused, or stored insecurely, they become easy targets for attackers.

    Read More
  • Is your AI safe? Threat analysis of MCP (Model Context Protocol)

    Is your AI safe? Threat analysis of MCP (Model Context Protocol)

    Unless you lived under a rock for the past several months or started a digital detox, you have probably encountered the MCP initials (Model Context Protocol). But what is MCP? Is this just a...

    Read Blog
  • Unified Security: Bridging the Gaps with a Defense-in-Depth Approach

    Unified Security: Bridging the Gaps with a Defense-in-Depth Approach

    The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to infiltrate the organization, move laterally and vertically throughout the organization, and...

    Read Blog
  • Multi-Cloud, One Mission: Locking Down Your Secrets48:10

    Multi-Cloud, One Mission: Locking Down Your Secrets

    As organizations embrace multi-cloud to boost innovation and agility, they face growing security and compliance risks.

    Watch Video
  • Merging Without Meyhem: PAM Strategies That Work

    Merging Without Meyhem: PAM Strategies That Work

    Whether you're acquiring a new business, merging two giants, or modernizing legacy systems, privileged access can become your strongest shield – or your weakest link.

    Read More
  • AI, Human Behavior and the Identity Security Risks You Can’t Ignore33:53

    AI, Human Behavior and the Identity Security Risks You Can’t Ignore

    Learn about identity security trends from the CyberArk 2025 Identity Security Landscape Report and risk reduction guidance.

    Watch Video
  • Preventing Cloud Access Mismanagement – Lessons from the Codefinger Ransomware Attack30:41

    Preventing Cloud Access Mismanagement – Lessons from the Codefinger Ransomware Attack

    Cloud environments are prime targets for cyberattacks. Join us to learn how ZSP and TEA frameworks prevent breaches while keeping developers productive.

    Watch Video
  • Beyond the Breach: Fortifying Identity Security in Incident Response46:57

    Beyond the Breach: Fortifying Identity Security in Incident Response

    Drawing from real-world incident response engagements, our expert will help you to identify and prioritize proactive controls through lessons learned from the field.

    Watch Video
  • Reduce the Endpoint Attack Surface and Mitigate Unknown Threats

    Reduce the Endpoint Attack Surface and Mitigate Unknown Threats

    Mitigate ransomware and other dynamic, identity-based threats by taking an identity-centric, defense-in-depth approach to endpoint security.

    Read More
  • Whole-of-State Cybersecurity: A Unified Approach to Protecting Government

    Whole-of-State Cybersecurity: A Unified Approach to Protecting Government

    In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government...

    Read Blog
  • Maximize Risk Reduction and Prevent Unknown Threats With Endpoint Identity Security

    Maximize Risk Reduction and Prevent Unknown Threats With Endpoint Identity Security

    Take a proactive approach and secure endpoints with identity security controls to prevent unknown threats and maximize risk reduction.

    Read More
  • Prevent Common Password Attacks With a Security-First Approach

    Prevent Common Password Attacks With a Security-First Approach

    A practical guide to eliminating password risks with identity-based, passwordless authentication for stronger protection and better user experience.

    Read More
  • 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management

    2025 KuppingerCole Leadership Compass for Enterprise Secrets Management

    CyberArk Named an Overall Leader in the 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management.

    Read More
  • 2025 Identity Security Landscape Snapshot

    2025 Identity Security Landscape Snapshot

    See the top identity security trends brought to life in charts and data. This infographic breaks down key findings from the 2025 Identity Security Landscape.

    Read More
  • Pre-Mortem: AI Agents and the Next Major Breach26:50

    Pre-Mortem: AI Agents and the Next Major Breach

    In this keynote with CyberArk’s Lavi Lazarovitz, learn how AI agents expose new threats and what organizations can learn from these insights.

    Watch Video
  • AI Systems and Emerging Risks30:43

    AI Systems and Emerging Risks

    Get key insights on AI risks and resilience from MIT’s Prof. Retsef Levi in this must-watch keynote on secure AI system design.

    Watch Video
  • CIO POV: Identity and the Unbalanced Tension Between Attacker and Defender

    CIO POV: Identity and the Unbalanced Tension Between Attacker and Defender

    Protecting a large enterprise is like playing goalkeeper in a soccer match. A CISO’s job is to keep the net clean while multiple attackers close in from various angles, aiming to score. No matter...

    Read Blog
  • Enhancing Kubernetes Security: Strategies for Effective Secrets Management

    Enhancing Kubernetes Security: Strategies for Effective Secrets Management

    Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised...

    Read Blog
  • loading
    Loading More...