• SWIFT Security Concerns Resurface

    The Bangladesh Bank heist has resurfaced as reports around a potential perpetrator make headlines. The recent focus may be on who and why, but lessons should be learned from what happened – it’s important to recognize common attack patterns and …

  • Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

    It’s widely understood that cyber intruders and internal threat actors seek and exploit privileged accounts to help them achieve their goals. Security experts advise organizations to know what’s on their networks and know it better than any potential adversary. But …

  • Building Privileged Account Security into the Cloud

    In our regular conversations with customers and others, many tell us their organization is on a “journey to the cloud.” Inevitably, the discussion turns towards privileged accounts in cloud environments and how to secure them.  We have solid advice and …

  • Service Providers: a Weak Link in an Organization’s Cyber Security Program?

    Vendor-related IT security is a well-documented concern within the cyber security industry. In exploring the main cyber security challenges with third-party vendors, a recent Mandiant report highlights several issues associated with attacks stemming from IT outsourcing (ITO). According to the …