A global report from CyberArk which shows that 79% of senior security professionals say that cybersecurity has taken a back seat in the last year in favor of accelerating other digital business initiatives. The CyberArk 2022 Identity Security Threat Landscape Report identifies how the rise of human and machine identities – often running into the hundreds of thousands per organization – has driven a buildup of identity-related cybersecurity “debt”, exposing organizations to greater cybersecurity risk.
Recommended for You
![A Brief History of Game Cheating](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F07%2Fbrief-history.jpg&size=1&version=1721913266&sig=11d2c261ff5c612486c489650aaa4a9d&default=hubs%2Ftilebg-blogs.jpg)
Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...
![Double Dipping Cheat Developer Gets Caught Red-Handed](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F07%2Fdouble-dipping-hero.jpg&size=1&version=1721914638&sig=3cdd00ffc171c6df7bbb7f6a3f9e756f&default=hubs%2Ftilebg-blogs.jpg)
Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...
![CyberArk 2024 Identity Security Education Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MzE0JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWUyOTM1NjI2M2M3NTE1MDZmNTdjOGZjZWE0MWU1NTBl/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Education, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
![CyberArk 2024 Identity Security Manufacturing Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MjUxJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTlhOTk3Y2UwNGRkN2EzZmUyNjI1ZTIyODA2NThjM2Vi/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Manufacturing, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
![CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MjQ4JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWY1MDA3YjM3MmY3YmQ3ZTBmNTRiYmNjNjYzNTYzMThm/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Public Sector, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
![CyberArk 2024 Identity Security Healthcare Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MjQ3JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPThmMWI5MGVjODQzNDI1Y2U4MzUyY2Q2ZThmNzM2ZmZm/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Healthcare, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
![CyberArk 2024 Identity Security Technology Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MjQ2JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTdjM2UyMjYwNDE5ZmUxODU4N2ZiM2RiMzg3YWZlMjQ4/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Technology, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
![CyberArk 2024 Identity Security Financial Services Threat Landscape Infographic](https://content.cdntwrk.com/files/aT0xNTI0MjQ1JnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPTE3MmY5MjA0NGIxZmQ4NTllZDU3YjU3YWQyNzdkMzdm/-w-320.jpg)
The CyberArk 2024 Identity Security Threat Landscape Infographic for Financial Services, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-
![Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F07%2Flocal-privilege-escalation-vulnerability.png&size=1&version=1721913045&sig=9964dc9b5c594a463708bfabc81b760e&default=hubs%2Ftilebg-blogs.jpg)
During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic...
![The Current State of Browser Cookies](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F07%2Fcurrentstate-ofobrowser-cookies.jpg&size=1&version=1721051905&sig=7743d5e8711e3d4a9900b3d1b7d496cd&default=hubs%2Ftilebg-blogs.jpg)
What Are Cookies When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts....
![Balancing Security and Resources: Endpoint Least Privilege in Corporate Environments](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fembed-ssl.wistia.com%2Fdeliveries%2Fb1f5604996e9416ec5fd2047c4942f95.jpg&size=1&version=1720420974&sig=905e5cbcaf3b245fe986e1991a5f2639&default=hubs%2Ftilebg-videos.jpg)
View this webinar to understand how CyberArk helps mid-market organizations effectively enforce least privilege with automation to ensure success even with limited resources and giving customers quick
![You Can’t Always Win Racing the (Key)cloak](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F06%2Fkeycloak-blog-hero.jpg&size=1&version=1720633182&sig=446bfb24fb8e212122fde96e0d8b7af6&default=hubs%2Ftilebg-blogs.jpg)
Web Race Conditions – Success and Failure – a Keycloak Case Study In today’s connected world, many organizations’ “keys to the kingdom” are held in identity and access management (IAM) solutions;...
![Interview: Embracing a Unified Identity-Centered Zero Trust Approach](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fembed-ssl.wistia.com%2Fdeliveries%2F37f0fa9d02cc22c5f84fef2087487282.jpg&size=1&version=1719540274&sig=f468695ac819e15cf3dc33c48ca65cd3&default=hubs%2Ftilebg-videos.jpg)
Watch this video interview with Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances
![Operation Grandma: A Tale of LLM Chatbot Vulnerability](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F05%2Fcreepy-bed.png&size=1&version=1719845022&sig=6530dded9453b2f389f8885cf04d80a0&default=hubs%2Ftilebg-blogs.jpg)
Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...
![CyberArk 2024 Identity Security Threat Landscape EMEA Report](https://content.cdntwrk.com/files/aT0xNTIxNzgxJnA9MCZ2ZXJzaW9uPTEmY21kPXYmc2lnPWI1MTJiYjU2ZDg1OGE3NDljNDBhMWJkOGY1NzQxYjIw/-w-320.jpg)
CyberArk 2024 Identity Security Threat Landscape EMEA Report provides detailed insights on identity-related cybersecurity threats and technology trends.
![Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response & Red Teams](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fembed-ssl.wistia.com%2Fdeliveries%2F7e2d63268ec8be0ce86ef70312912fa5.jpg&size=1&version=1719543749&sig=12d6cdbc136b24f5003c197b6e56f6e4&default=hubs%2Ftilebg-videos.jpg)
Attackers are increasingly successful in gaining access to systems. How prepared are you to defend against the latest attack methods?
![The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F02%2Fcosmos-millions-from-the-blockchain.png&size=1&version=1718922360&sig=f935bb8b13cf3c88fd05cea3350b8e96&default=hubs%2Ftilebg-blogs.jpg)
Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...
![A Deep Dive into Penetration Testing of macOS Applications (Part 3)](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2023%2F07%2Fdeep-dive-into-penetration-testing.jpg&size=1&version=1719516434&sig=570c075b3b5f08e0cf019cb834b95c03&default=hubs%2Ftilebg-blogs.jpg)
Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...
![APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F02%2Fhero_image.jpg&size=1&version=1719538511&sig=818a26fae6c3ee6d2b90e336bcecbfe1&default=hubs%2Ftilebg-blogs.jpg)
A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...
![Ransomware’s PLAYing a Broken Game](https://content.cdntwrk.com/mediaproxy?url=https%3A%2F%2Fwww.cyberark.com%2Fwp-content%2Fuploads%2F2024%2F01%2Fransomware-playing-a-broken-game.png&size=1&version=1719540223&sig=715517f3d6f6504726033aea855e10a8&default=hubs%2Ftilebg-blogs.jpg)
Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...