Okta Security recently disclosed that the October hack on their customer support system was far more extensive than initially reported. CyberArk resident expert Andy Thompson analyzes the latest developments on Okta’s breach of its customer support system with an emphasis on best practices.
Recommended for You
With new identities, environments and attack methods dominating today’s threat landscape, cybersecurity leaders are hyper-focused on securing identities to safeguard enterprises. However, a...
Secure all human and machine identities with the comprehensive CyberArk Identity Security Platform for enhanced security and operational efficiency.
The CyberArk Identity Security Platform secures workforce access across employees, third parties and partners to help protect credentials.
Watch this fireside chat to learn more from ESG Analyst Jack Poller about IAM trends, threats and Risk Mitigation Strategies
Navigate Identity Security excellence with CyberArk, a 2023 KuppingerCole Access Management Leader.
This ESG eBook details how identity & access management has evolved in recent years and what you can do to bolster your identity security.
Learn how intelligent privilege controls can help secure workforce access in complex IT environments where anyone can become a privileged user.
Learn key considerations for success in implementing passwordless authentication for enterprises.
The CyberArk Identity 23.11 release includes extended passwordless authentication capabilities with passkeys, setting stronger controls for user sessions and scheduling access termination.
Multi-factor authentication (MFA), when set up right, can help enterprises better protect identities, mitigate risks and secure access for the entire workforce.
CyberArk's resident experts, Khizar Sultan and Andy Thompson, examine the root causes and lessons learned from the MGM Resorts attack.
When creating a new password, you know the drill – it must be at least eight characters long, contain special characters and avoid sequential characters or be based on dictionary words. Although...
Overcome web application vulnerabilities with consistent controls that lets you monitor user activities in high-risk apps down to every click.
Learn how to secure access for your workforce and third parties by removing barriers to visibility, effective controls and efficiency.
Learn better ways to secure and simplify HR business processes that surround employee lifecycle management.
A modern approach to enforcing least privilege across the enterprise
Over six in 10 security decision-makers say their teams operate with limited visibility across their environments. Why? We could easily speculate that it comes down to the tools they do or don’t...
This webinar provides best practices for security teams to transform their access management programs from foundational to exceptional.
Secure access for workforce and external B2B users with a multi-layered identity security approach.
Integrate your HR and Identity and Access Management solutions to ensure all users have appropriate access through their tenure