• Securing Assets and Applications in the Cloud

    In our recent blog, Cloud Security: Who is Responsible for What?, we focused on the idea of shared responsibility in cloud environments; with IaaS/PaaS, the customer is responsible for everything above the hypervisor, while the cloud vendor takes responsibility for …

  • Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

    It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts to help them achieve their goals. Security experts advise organizations to know what’s on their networks and know it better than any potential adversary. But …

  • Building Privileged Account Security into the Cloud

    In our regular conversations with customers and others, many tell us their organization is on a “journey to the cloud.” Inevitably, the discussion turns towards privileged accounts in cloud environments and how to secure them.  We have solid advice and …

  • On-Premises or in the Cloud, Privileged Accounts Must be Protected

    Businesses continue to adopt a “cloud-first strategy” at an accelerated pace. Consider the following stats from IDC Research highlighted by the Wall Street Journal: Worldwide spending on public cloud services is estimated to grow by a 19.4% compound annual rate …