Watch the CyberArk Research Labs team uncover real world, cloud-based attack scenarios and dive deeper into why the cloud is such an attractive target for attackers as organizations accelerate cloud adoption. The team expands on innovative research on how internal and external threat actors are manipulating insufficient security controls cloud environments to steal sensitive data.
Recommended for You

Lani Refiti, Co-Founder and CEO at IoTSec Australia and Jeffery Kok, VP of Solution Engineers at CyberArk discuss the rapid expansion of IoT capability and the arrival of 5G in Australia.

Understand the key components of a modern Identity Security approach that empowers users with access to everything they need – while giving you peace of mind your assets are safe.

Learn how to mature and future-proof your program by following a simple and prescriptive best practice framework.

The CyberArk Blueprint for Identity Security Success is a framework of simple prescriptive guidance designed to measurably reduce risks.

Matt Tett, Managing Director at Enex TestLab and Andrew Slavkovic, Solutions Engineering Manager at CyberArk discuss the approach to IRAP, FedRAMP and other compliance schemes.

Learn how to enforce privilege security on the endpoint without the negative impact of removing local administrator rights and strengthen your protection to contain attacks at the endpoint.

This 2-minute video explores CyberArk’s Privileged Access Security Solution, which combines privileged credential management, session recording, least privilege enforcement and threat analytics.

In this whiteboard video we dive into CyberArk Privilege Cloud; the PAM as a Service offering from CyberArk that provides an easier way to deploy, onboard and scale Privileged Access Management.

Episode #6 features Tal Kandel, Director for Business Innovations on Cloud Entitlements Manager, the backstory of this newly launched solution and its features.

CyberArk's ANZ Regional Director, Thomas Fikentscher discusses improving security in 2021 - with more devices, new business models, & a more diversified workforce.

Revisit our recent Cloud Identity Security event for perspectives on securing AWS, Azure and GCP workloads from CyberArk Executives, customers, researchers and the industry analyst community.

Episode #5 features Bryan Murphy, Senior Director of Consulting Services on remediation services and how it help our customers.

With strong goals to create a more digital economy, what can governments learn from the private sector? What is the nexus between the public sector and private sector from a cyber design perspective?

Robert Deakin - Director of Cyber Security, ACCC (Australian Competition and Consumer Commission) & CyberArk's ANZ Regional Director, Thomas Fikentscher discuss securing a digital economy.

Explore CyberArk Cloud Entitlements Manager's key features and value proposition in this solution demonstration.

Cloud Entitlements Manager provides a rapid, simple, consistent solution to implement least privilege access for all cloud identities.

See how CyberArk's Bulk Upload feature makes it easy for PAM administrators to rapidly onboard a large volume of accounts when launching or expanding a CyberArk deployment.

In this short video, Enterprise Management Associates (EMA) analyst Steve Brasen highlights a four-phased approach to adaptive access management.

CyberArk is the only Identity Security Vendor with dedicated research labs. This video provides an introduction to the labs team, and how their research benefits the broader security community.

Episode #4 features Lavi Lazarovitz, Head of Research at CyberArk Labs to share research on Microsoft Teams vulnerabilities and other research & tools.