Deconstructing Identity Security
Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration...
Read Blog
Post-CircleCI Breach, Focus on Identity Security Strategy
When news of the recent CircleCI breach broke, developers everywhere scrambled to rotate tokens and remove hardcoded secrets stored in the popular CI/CD platform to minimize their exposure. Now...
Read Blog
Three Ways to Reinforce Least Privilege with Identity Management
The definition of privilege is changing, and this changes everything. Identities of all types — not just IT team members, but any employees — are gaining access to sensitive data, infrastructure...
Read Blog
Identity Security: Bridging the Executive Confidence/Reality Gap
In recent years, cybersecurity has become a board-level issue resulting in several executives taking greater responsibility in cybersecurity-related decisions. As a result, the CISO is no longer a...
Read Blog
How Identity Security Addresses Key DoD Zero Trust Requirements
The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...
Read Blog
Identity Security Calls for Leadership Across Categories
Albert Einstein once said, “The leader is one who, out of the clutter, brings simplicity … out of discord, harmony … and out of difficulty, opportunity.” CyberArk is the only Leader in both 2022...
Read Blog
2023 Cyber Insurance Looks Different. Are You Ready?
Rampant ransomware attacks have made cyber insurance a C-suite priority. Despite the raised consciousness, it’s more difficult than ever to secure or renew a policy. Nefarious activity continues...
Read Blog
5 Defense-in-Depth Layers for Enabling Secure Access
Cybersecurity is one of many industries that love jargon. As in the medical and legal professions, complex topics often get crunched into digestible phrases, with the “stickiest” of terms...
Read Blog
Why and How Federal Agencies Need to Improve Their FITARA Scorecard
In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harden federal networks and advance key priorities outlined in President Biden’s May 2021...
Read Blog
Identity Security in Action at Diamond Trust Bank
For more than 70 years, customers in East Africa have trusted Diamond Trust Bank (DTB) for their banking needs. Listed on the Nairobi Securities Exchange (NSE), the leading regional bank is an...
Read Blog
Identity Security: Putting It All Together
Here at CyberArk, we’ve been sharing how Identity Security offers a modern approach grounded in Zero Trust and least privilege to protect organizations’ most critical assets. In recent weeks,...
Read Blog
6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director
CyberArk EMEA Technical Director David Higgins works closely with some of the world’s largest and most heavily regulated organizations in architecting Identity Security strategies that help...
Read Blog
CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for PAM Again
CyberArk is proud to announce it has been named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management.1 The company was positioned both highest in ability to execute and...
Read Blog