The CyberArk 2022 Identity Security Threat Landscape Report found that over 73% of organizations had been targeted by ransomware attacks in the past year. And attacks are only going to become more frequent as organizations go through their digital transformations and increase their cybersecurity debt.
This report summarizes findings from 1,750 global respondents comparing organizations targeted with ransomware attacks against those who were not. Highlights of the report include:
• The size of an organization doesn’t matter when it comes to a ransomware attack.
• Healthcare and media/entertainment sectors were more likely to suffer from ransomware attacks.
• Human and machine identities were given generous access to sensitive corporate data and assets, opening the door for identity-related attacks.
Read the eBook to learn more.
Recommended for You

CyberArk experts uncover Scattered Spider’s latest identity attacks and review how to detect threats and defend against privilege abuse.

Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the...

API keys are essential for securing application access, but when hard coded, reused, or stored insecurely, they become easy targets for attackers.

Unless you lived under a rock for the past several months or started a digital detox, you have probably encountered the MCP initials (Model Context Protocol). But what is MCP? Is this just a...

The identity is the main attack vector for cybercriminals, with cybercriminals using stolen identity to infiltrate the organization, move laterally and vertically throughout the organization, and...

As organizations embrace multi-cloud to boost innovation and agility, they face growing security and compliance risks.

Whether you're acquiring a new business, merging two giants, or modernizing legacy systems, privileged access can become your strongest shield – or your weakest link.

Learn about identity security trends from the CyberArk 2025 Identity Security Landscape Report and risk reduction guidance.

Cloud environments are prime targets for cyberattacks. Join us to learn how ZSP and TEA frameworks prevent breaches while keeping developers productive.

Drawing from real-world incident response engagements, our expert will help you to identify and prioritize proactive controls through lessons learned from the field.

Mitigate ransomware and other dynamic, identity-based threats by taking an identity-centric, defense-in-depth approach to endpoint security.

In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government...

Take a proactive approach and secure endpoints with identity security controls to prevent unknown threats and maximize risk reduction.

A practical guide to eliminating password risks with identity-based, passwordless authentication for stronger protection and better user experience.

CyberArk Named an Overall Leader in the 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management.

See the top identity security trends brought to life in charts and data. This infographic breaks down key findings from the 2025 Identity Security Landscape.

In this keynote with CyberArk’s Lavi Lazarovitz, learn how AI agents expose new threats and what organizations can learn from these insights.

Get key insights on AI risks and resilience from MIT’s Prof. Retsef Levi in this must-watch keynote on secure AI system design.

Protecting a large enterprise is like playing goalkeeper in a soccer match. A CISO’s job is to keep the net clean while multiple attackers close in from various angles, aiming to score. No matter...

Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised...