• Securing Assets and Applications in the Cloud

    In our recent blog, Cloud Security: Who is Responsible for What?, we focused on the idea of shared responsibility in cloud environments; with IaaS/PaaS, the customer is responsible for everything above the hypervisor, while the cloud vendor takes responsibility for …

  • Application Credentials: The Hidden Attack Pathway into Your Organization

    Today, it’s well-understood that credentials belonging to IT administrators, business users, partners and others with high levels of network access are critical for gaining unauthorized access to key systems, and ultimately, the heart of the enterprise. As we’ve explored previously, …

  • Short Video: Learn how CyberArk Secures and Manages Privileged Credentials Used by COTS Applications

    For more than a decade, Evan Litwak, CyberArk’s principal sales engineer, has worked with many companies to architect and successfully deploy privileged account security measures. For several years, he also worked directly for a large enterprise company and there, he …