• Your Greatest Threat Might Already Be Inside Your Network

    Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are difficult to come by because requirements for reporting security incidents are not consistent across sectors. But some studies show they account for more than half …

  • The Value of Experience: Leveraging Peer-to-Peer Guidance

    There is a story of a man trapped in a deep hole, shouting for help. A second man passing by hears the calls and jumps into the hole with him. “Why did you do that?” the first man asks. “Now …

  • Noteworthy Cyber Security Statistics

    Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog. With the launch of a new year, it’s a good time to be mindful …

  • Application Credentials: The Hidden Attack Pathway into Your Organization

    Today, it’s well-understood that credentials belonging to IT administrators, business users, partners and others with high levels of network access are critical for gaining unauthorized access to key systems, and ultimately, the heart of the enterprise. As we’ve explored previously, …

  • The Other Insider Threat

    The trusted insider has always been a security risk – whether an executive with access to sensitive information or an administrator on an enterprise network. According to a recent report from the Ponemon Institute, 56 percent of security practitioners surveyed …