新闻报道

‘There’s a correlation between geopolitical tension and the rise of cyberattacks,’ says CyberArk CEO
https://www.cnbc.com/video/2022/02/10/theres-a-correlation-between-geopolitical-tension-and-the-rise-of-cyberattacks-says-cyberark-ceo.html

CyberArk research: Microsoft RDP vulnerability makes it a breeze for attackers to become men-in-the-middle
https://www.techrepublic.com/article/microsoft-rdp-vulnerability-makes-it-a-breeze-for-attackers-to-become-men-in-the-middle/

10 Hot Cybersecurity Companies You Should Watch In 2022
https://www.crn.com/slide-shows/security/10-hot-cybersecurity-companies-you-should-watch-in-2022/4

CyberArk’s Lavi Lazarovitz appears on Baystate Business to discuss Log4j
https://www.bloomberg.com/news/audio/2021-12-14/baystate-business-cyber-vulnerability-radio

CyberArk’s Mark Hurter on how data fuels transformation
https://www.fedscoop.com/video/cyberarks-mark-hurter-on-how-data-fuels-transformation/

Report: 93% of U.S. orgs experienced employee misuse of web apps
https://venturebeat.com/2021/11/03/report-93-of-u-s-orgs-experienced-employee-misuse-of-web-apps/

Most businesses agree that employees use business apps irresponsibly
https://www.techradar.com/news/most-businesses-agree-that-employees-use-business-apps-irresponsibly

Israeli Researcher Cracked Over 3,500 Wi-Fi Networks in Tel Aviv City
https://thehackernews.com/2021/10/israeli-researcher-cracked-over-3500-wi.html

Your Wi-Fi network is too easy to hack — how to protect yourself
https://www.tomsguide.com/news/wifi-password-mass-crack

Wardrivers Can Still Easily Crack 70% of Wi-Fi Passwords
https://www.darkreading.com/attacks-breaches/wardrivers-can-still-crack-70-of-wifi-passwords

CyberArk CEO on growth opportunity in the identity security sector
https://www.cnbc.com/video/2021/09/13/cyberark-ceo-on-growth-opportunity-in-the-identity-security-sector.html

How do I select a container security solution for my business?
https://www.helpnetsecurity.com/2021/09/08/select-container-security-solution/

This Researcher Hacked Windows Hello Using the Ultimate in Public Data: Your Face
https://uk.pcmag.com/security/134935/this-researcher-hacked-windows-hello-using-the-ultimate-in-public-data-your-face

Analysis: The 2021 Gartner Magic Quadrant for Privileged Access Management
https://solutionsreview.com/identity-management/analysis-the-2021-gartner-magic-quadrant-for-privileged-access-management/?utm_source=rss&utm_medium=rss&utm_campaign=analysis-the-2021-gartner-magic-quadrant-for-privileged-access-management

Windows Hello: la reconnaissance faciale présente une vulnérabilité
https://www.presse-citron.net/windows-hello-la-reconnaissance-faciale-presente-une-vulnerabilite/

Windows 10 security: Here’s how researchers managed to fool Windows Hello
https://www.zdnet.com/article/windows-10-security-heres-how-researchers-managed-to-fool-windows-hello/

Hackers Got Past Windows Hello by Tricking a Webcam
https://www.wired.com/story/windows-hello-facial-recognition-bypass/

CyberArk uncovers significant vulnerability in Windows Hello facial recognition
https://www.calcalistech.com/ctech/articles/0,7340,L-3912572,00.html

Microsoft Issues Serious Windows 10 Upgrade Warning
https://www.forbes.com/sites/gordonkelly/2021/07/15/microsoft-windows-10-security-warning-critical-important-fixes-windows-hello-free-windows-10-upgrade/?sh=5e283e424eff

CyberArk Has Launched a Series of Diverse Challenges
https://www.israeldefense.co.il/node/50821

CyberArk Will Sponsor Gili Muser Ahead of Tokyo
https://www.one.co.il/Article/387438.html

Dangerous Trend: What Will Happen on the Day Hackers Shut Down the Stock Market?
https://www.bizportal.co.il/globalmarkets/news/article/794085

CyberArk Encourages Organizations to Adopt An ‘Assume Breach’ Mentality
https://www.varindia.com/news/cyberark-encourages-organizations-to-adopt-an-assume-breach-mentality

CyberArk Encourages Organizations to Adopt An ‘Assume Breach’ Mentality
https://www.varindia.com/news/cyberark-encourages-organizations-to-adopt-an-assume-breach-mentality

Understanding the Root Cause of Opportunistic and Targeted Ransomware Attacks
https://www.enterpriseitnews.com.my/understanding-the-root-cause-of-opportunistic-and-targeted-ransomware-attacks/

‘Strong Office Culture’ Carried CyberArk Through Covid
https://www.bizjournals.com/boston/news/2021/06/16/strong-office-culture-carried-cyberark-through-c.html

CyberArk Identity Security Platform Enhancements Secure Risky Access and Broaden Identity Protection
https://www.helpnetsecurity.com/2021/06/10/cyberark-identity-security-platform

Required MFA Is Not Sufficient for Strong Security: Report
https://www.darkreading.com/cloud/required-mfa-is-not-sufficient-for-strong-security-report/d/d-id/1341263

Digital Risk: A Risk Like Any Other
https://www.techradar.com/news/digital-risk-a-risk-like-any-other

Biohacker Shows How Hand Implant Attacks Can Work
https://archerint.com/biohacker-shows-how-hand-implant-attacks-can-work/

CyberArk Inaugurates New Cybersecurity R&D Center in Beersheba
https://www.timesofisrael.com/cyberark-inaugurates-new-cybersecurity-rd-center-in-beersheba/

Op-Ed: What Nightclubs Can Teach Us About Cyber Security
https://www.cybersecurityconnect.com.au/critical-infrastructure/6900-op-ed-what-nightclubs-can-teach-us-about-cyber-security

The Long Road to Rebuilding Trust After ‘Golden SAML’-Like Attacks
https://www.darkreading.com/operations/the-long-road-to-rebuilding-trust-after-golden-saml-like-attacks-/d/d-id/1340985?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Supply Chain Penetration: Here’s How You Can Protect Yourself
https://tech.hindustantimes.com/tech/news/supply-chain-penetration-here-s-how-you-can-protect-yourself-71620833432955.html

Password Day 2021: Tips for Your First Line of Defense
https://cisomag.eccouncil.org/world-password-day-2021-tips/

The Latest Methods Cyber-Criminals Are Using
https://www.techradar.com/news/the-latest-methods-cyber-criminals-are-using

RTF Report: Combatting Ransomware
https://securityandtechnology.org/ransomwaretaskforce/report/

In IT Security, All Roads Lead to Identity
https://cisomag.eccouncil.org/in-it-security-all-roads-lead-to-identity/

Five Kubernetes Secrets Pitfalls and How to Avoid Them
https://vmblog.com/archive/2021/04/23/five-kubernetes-secrets-pitfalls-and-how-to-avoid-them.aspx#.YIrLT-hKjIV

How Do I Select an Identity Management Solution For My Business
https://www.helpnetsecurity.com/2021/04/21/select-identity-management-solution/

People, Devices And Apps All Have Identities. Each Offers A Rich Target For Cyber Attackers To Exploit
https://which-50.com/people-devices-and-apps-all-have-identities-each-offers-a-rich-target-for-cyber-attackers-to-exploit/

How Much Data Was Leaked to Cybercriminals In 2020 — And What They’re Doing With It
https://www.forbes.com/sites/forbestechcouncil/2021/04/20/how-much-data-was-leaked-to-cybercriminals-in-2020---and-what-theyre-doing-with-it/?sh=6035b7d1f03f

CyberArk Unveils Open Source Pen Testing Tool For Kubernetes
https://containerjournal.com/features/cyberark-unveils-open-source-pen-testing-tool-for-kubernetes/

Cyber Safe Strategies as Remote Working Becomes Standard
https://www.smehorizon.com/cyber-safe-strategies-as-remote-working-becomes-standard/

Danger Lurks in Organizations’ Hunger For Data
https://www.innovationaus.com/danger-lurks-in-organisations-hunger-for-data/

IoT Cybersecurity Act Places Security Onus on Device
https://www.iotworldtoday.com/2021/04/05/iot-cybersecurity-act-places-security-onus-on-device-makers/

The Future of Remote Work
https://tickernews.co/programs/thomas-fikentscher-the-future-of-remote-workmp4-713c6b

Managing Identity, The Important Credentials in Today’s Cybersecurity Landscape
https://cybersecurityasean.com/daily-news/managing-identity-important-credentials-today%E2%80%99s-cybersecurity-landscape-%E2%80%93-cyberark

The Importance of a Zero Trust-Based Approach to Identity Security
https://www.helpnetsecurity.com/2021/03/29/zero-trust-identity-security/

Largest Cybersecurity Companies in Massachusetts
https://www.bizjournals.com/boston/subscriber-only/2021/03/25/largest-cybersecurity-companies-in.html

5 Tips for Implementing a Zero Trust Model
https://www.techrepublic.com/article/5-tips-for-implementing-a-zero-trust-model/

A Cyber-Savvy Nation Through Reskilling
https://www.innovationaus.com/a-cyber-savvy-nation-through-reskilling/?utm_content=buffer7b57d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Face Verification Can Better Secure ATM Transactions, Although New Risks May Emerge: Experts
https://www.channelnewsasia.com/news/singapore/face-verification-atm-transactions-security-ocbc-14444772

The Cybersecurity 202Network: Connecting Cybersecurity Experts Across Government and Industry in an Ongoing Survey
https://www.washingtonpost.com/politics/2021/02/23/cybersecurity-202-network/?arc404=true

Hackers Breach Thousands of Security Cameras With Password Found Online
https://www.smh.com.au/technology/hackers-breach-thousands-of-security-cameras-with-password-found-online-20210311-p579n0.html?ref=rss&utm_medium=rss&utm_source=rss_feed

CyberArk: Pivot to SaaS Has Brought More Partners, Customers
https://www.crn.com.au/news/cyberark-pivot-to-saas-has-brought-more-partners-customers-562049?utm_source=mobile&utm_medium=twitter&utm_campaign=share

CyberArk Appoints Avril England to its Board of Directors
https://www.helpnetsecurity.com/2021/03/11/cyberark-avril-england/?utm_source=dlvr.it&utm_medium=twitter

A Cybersecurity Stock Analyst Weighs in on the Microsoft Email Hack
https://www.cnbc.com/video/2021/03/08/a-cybersecurity-stock-analyst-weighs-in-on-the-microsoft-email-hack.html

Deepfake article with CyberArk Labs comment
https://www.independent.co.uk/life-style/gadgets-and-tech/deepfake-tom-cruise-video-ai-b1813908.html

Article on new CyberArk identity security launch
https://www.intelligentciso.com/2021/03/04/cyberark-delivers-new-identity-security-offerings-to-drive-customer-success/

CyberArk Identity Security helps enterprises adapt and embrace a risk-based strategy
https://www.helpnetsecurity.com/2021/03/03/cyberark-identity-security/

Article on personalized cyber attacks
https://technative.io/2021-cybersecurity-trends-the-emergence-of-the-personalised-attack-chain/

How to Run a Successful Penetration Test
https://www.darkreading.com/vulnerabilities---threats/how-to-run-a-successful-penetration-test------------------/d/d-id/1340135?image_number=7

Big Russian Hack Used A Technique Experts Had Warned About for Years. Why Wasn’t the U.S. Government Ready?
https://www.washingtonpost.com/technology/2021/02/09/fireeye-hack-russia-microsoft/

Cybersecurity and the Privilege of Using Data
https://www.innovationaus.com/cybersecurity-and-the-privilege-of-using-data-2/

Chris Moore, VP Global Channels, Recognized by CRN as a 2021 Channel Chief
https://www.crn.com/channel-chiefs/cc2021-details.htm?c=99

Applying Critical Learnings from 2020 to Cybersecurity and Digital Risk Management
https://www.forbes.com/sites/forbestechcouncil/2021/02/09/applying-critical-learnings-from-2020-to-cybersecurity-and-digital-risk-management/?sh=63bdd0be4451

The 20 Coolest Cloud Security Vendors of the 2021 Cloud 100
https://www.crn.com/slide-shows/security/the-20-coolest-cloud-security-vendors-of-the-2021-cloud-100/4

Andrew Slavkovic, CyberArk Solutions Engineering Manager Talks 2021, Breaches and Beyond
https://www.itwire.com/security/video-interview-andrew-slavkovic,-cyberark-solutions-engineering-manager-talks-2021,-breaches-and-beyond.html

5 Tips to Keep Your Data SAFE
https://www.rediff.com/getahead/column/-5-tips-to-keep-your-data-safe-from-cyber-crime/20210128.htm

Eliminating Excessive Permissions via Least Privilege Approach
https://www.itweb.co.za/content/nWJadvbeJBlqbjO1

The SolarWinds Hackers Used Tactics Other Groups Will Copy
https://www.wired.com/story/solarwinds-hacker-methods-copycats/

Top 7 Security Mistakes When Migrating to Cloud-Based Apps
https://www.csoonline.com/article/3602609/top-7-security-mistakes-when-migrating-to-cloud-based-apps.html#tk.rss_all

Remote Work Threatened by Poor Security Habits at Home
https://www.israel21c.org/remote-work-threatened-by-poor-security-habits-at-home/

From Diversity Efforts to Pandemic Recovery, Workforce Issues Will Evolve in 2021
https://www.scmagazine.com/home/year-in-review/from-diversity-efforts-to-pandemic-recovery-workforce-issues-will-evolve-in-2021/

Protecting Cloud Identities: How to Effectively Implement a Zero Trust Approach
https://www.teiss.co.uk/protecting-cloud-identities-how-to-effectively-implement-a-zero-trust-approach/

2021 Threat Predictions: Bad Actors that Honed Their Craft with COVID are Ready to go Big
https://www.scmagazine.com/home/year-in-review/2021-threat-predictions-bad-actors-that-honed-their-craft-with-covid-are-ready-to-go-big/

SolarWinds Campaign Focuses Attention on ‘Golden SAML’ Attack Vector
https://www.darkreading.com/attacks-breaches/solarwinds-campaign-focuses-attention-on-golden-saml-attack-vector/d/d-id/1339794

Filling the Talent Gap in Cybersecurity Now
https://omny.fm/shows/money-fm-893/filling-the-talent-gap-in-cybersecurity-now

95% of Employees Want to Continue Remote Working, 67% Ignore Corporate Security Policies
https://www.crn.in/work-from-anywhere/95-of-employees-want-to-continue-remote-working-67-ignore-corporate-security-policies/

Help or Hindrance? AI in Cybersecurity
https://govinsider.asia/digital-gov/cyberark-jeffrey-kok-ai-in-cybersecurity/

Cyber Daily: How to Handle Cyberattacks; Vaccine Information Targeted Again by Hackers
https://www.wsj.com/articles/cyber-daily-how-to-handle-cyberattacks-vaccine-information-targeted-again-by-hackers-11607610048

Payment Card Skimming Group Deployed Raccoon Infostealer
https://www.bankinfosecurity.com/payment-card-skimming-group-deployed-raccoon-infostealer-a-15549

Don’t Risk It: Security Success Starts With Controlling Privileged Access
https://www.scmagazine.com/perspectives/dont-risk-it-security-success-starts-with-controlling-privileged-access/

CyberArk Discloses Kubernetes Security Issues
https://containerjournal.com/topics/container-security/cyberark-discloses-kubernetes-security-issues

Meet the Israeli Researchers Protecting Your Robovac From a Spy Infiltration
https://www.haaretz.com/israel-news/tech-news/.premium.HIGHLIGHT-meet-the-israeli-researchers-protecting-your-robovac-from-a-spy-infiltration-1.9286262

FBI: Ransomware Attacks Are Imminent Threat – Experts Weigh-In On Recent Events
https://www.enterprisesecuritytech.com/post/fbi-ransomware-attacks-are-imminent-threat-experts-weigh-in-on-recent-events-part-2

Israel’s National Cyber Week Was Conducted As An Online Conference
https://jewishreview.co.il/israels-national-cyber-week-was-conducted-as-an-online-conference-11631/

9 Israeli Companies Among 100 Tech ’Emerging Market Challengers’
https://www.timesofisrael.com/9-israeli-companies-among-100-tech-emerging-market-challengers/

Paris Forum sees Covid 19 Heightening Cyber Vulnerability
https://en.globes.co.il/en/article-paris-forum-sees-covid-19-heightening-cyber-vulnerability-1001349329

Flaws in Privileged Management Apps Expose Machines to Attack
https://www.darkreading.com/application-security/flaws-in-privileged-management-apps-expose-machines-to-attack/d/d-id/1339419

Deconstructing Human Nature and Social Engineering
https://indvstrvs.com/deconstructing-human-nature-and-social-engineering-attacks/

Identity is the new parameter
https://www.israeldefense.co.il/he/node/45975

Suppressing Trickbot: cyber warfare and cyber lawfare. Chaining vulnerabilities. An intergovernmental call for backdoors in the aid of law enforcement.
https://thecyberwire.com/podcasts/daily-podcast/1192/notes

New Flaws in Top Antivirus Software Could Make Computers More Vulnerable
https://thehackernews.com/2020/10/antivirus-software-vulnerabilities.html

The Threat Within: Understanding And Driving Effective Insider Threat Programs
https://www.forbes.com/sites/forbestechcouncil/2020/09/21/the-threat-within-understanding-and-driving-effective-insider-threat-programs/#542d585d17c3

Gartner: Privileged Access Management a Must in 2020
https://searchsecurity.techtarget.com/news/252489097/Gartner-Privileged-access-management-a-must-in-2020

Is Security The Price We Pay For Ease Of Use? What Companies Can Learn From Zoom’s Privacy Dilemma
https://www.forbes.com/sites/forbestechcouncil/2020/08/20/is-security-the-price-we-pay-for-ease-of-use-what-companies-can-learn-from-zooms-privacy-dilemma/#25097adb3199

Cyber Attacks in the Pandemic Era More of the Same
https://cybersecurityasean.com/expert-opinions-opinion-byline/cyber-attacks-pandemic-era-more-same

New tool detects shadow admin accounts in AWS and Azure environments
https://www.zdnet.com/article/new-tool-detects-shadow-admin-accounts-in-aws-and-azure-environments/

Hackers Compromise Twitter Accounts Of Major Public Figures
https://www.silicon.co.uk/e-marketing/socialmedia/hackers-twitter-accounts-major-public-figures-346382?utm_source=2020-07-17&utm_medium=email&utm_campaign=uk_silicon_v2&t=1f67fc0de23eee673649847ef9bc2dfb1805484&pos=mostViewedArticle_1_title

Privilege escalation explained: Why these flaws are so valuable to hackers
https://www.csoonline.com/article/3564726/privilege-escalation-explained-why-these-flaws-are-so-valuable-to-hackers.html#tk.rss_all

Article on Privileged Access Management myths
https://www.infosecurity-magazine.com/blogs/busting-pam-myths

Work from home survey finds major security lapses as workers share devices, reuse passwords
https://www.scmagazine.com/home/security-news/news-archive/coronavirus/work-from-home-survey-finds-major-security-lapses-as-workers-share-devices-reuse-passwords/

Is The Future Of Identity Connecting Our Digital Persona With Our Real-Life Identity?
https://www.forbes.com/sites/forbestechcouncil/2019/08/01/is-the-future-of-identity-connecting-our-digital-persona-with-our-real-life-identity/#50c543004a0f

The Cyberthreat You Didn’t Even Know Was Out There
https://www.forbes.com/sites/forbestechcouncil/2020/06/26/the-cyberthreat-you-didnt-even-know-was-out-there/#7477f04c5f82

CyberArk snaps up identity startup Idaptive for $70M
https://techcrunch.com/2020/05/13/cyberark-snaps-up-identity-startup-idaptive-for-70m/

CyberArk Buys Identity Security Vendor Idaptive For $70 Million
https://www.crn.com/news/security/cyberark-buys-identity-security-vendor-idaptive-for-70-million

Proof of life: The past, present, and future of identity
https://www.biometricupdate.com/202005/proof-of-life-the-past-present-and-future-of-identity

Hackers are preying on fears of Covid-19, say cyber security experts
https://www.hindustantimes.com/tech/hackers-are-preying-on-fears-of-covid-19-says-cyber-security-experts/story-4SIki55hdtVLRycZgjz7JO.html

Azure Red Flag: Microsoft Accidentally Fixes Cloud Config ‘Bug’
https://threatpost.com/azure-red-flag-microsoft-fixes-cloud-config-bug/153928/

The Top 5 Questions Organisations Should Ask About their VPN Connections
https://www.cbronline.com/list/vpn-connections-top-5-questions

Malicious Actors Actively Distributing Novel “CoronaVirus” Ransomware
https://www.technadu.com/malicious-actors-distributing-novel-coronavirus-ransomware/95650/

As businesses struggle to keep up with operations, can tech help?
https://omny.fm/shows/money-fm-893/as-businesses-struggle-to-keep-up-with-operations

Defending against multifaceted election attacks
https://gcn.com/articles/2020/02/24/multfaceted-election-threats.aspx

The 20 Coolest Identity Access Management And Data Protection Companies Of 2020: The Security 100
https://www.crn.com/slide-shows/security/the-20-coolest-identity-access-management-and-data-protection-companies-of-2020-the-security-100/5

Raccoon malware targets massive range of browsers to steal your data and cryptocurrency
https://www.zdnet.com/article/raccoon-malware-targets-massive-browser-range-to-steal-your-data-and-cryptocurrency/#ftag=RSSbaffb68

CyberArk launches new program to help customers reduce privilege-related risk
https://www.helpnetsecurity.com/2020/02/17/cyberark-blueprint-for-privileged-access-management-success/

Industrial control system security needs urgent revamp, says study
https://www.scmagazineuk.com/industrial-control-system-security-needs-urgent-revamp-says-study/article/1674623

Fox Kitten APT campaign exploits VPN flaws hours after public disclosure
https://www.scmagazine.com/home/security-news/cybercrime/fox-kitten-apt-campaign-exploits-vpn-flaws-hours-after-public-disclosure/

The 12 Hottest Identity And Data Protection Tools Unveiled At RSA 2020
https://www.crn.com/slide-shows/security/the-12-hottest-identity-and-data-protection-tools-unveiled-at-rsa-2020/3

CyberArk’s Report Reveals Importance of Robotic Process Automation
https://www.cisomag.com/cyberarks-report-reveals-importance-of-robotic-process-automation/

‘Raccoon’ Infostealer Now Targeting 60 Apps: Report
https://www.govinfosecurity.com/raccoon-infostealer-now-targeting-60-apps-report-a-13766

Idaptive Identity Access Control: Product Overview and Insight
https://www.eweek.com/it-management/idaptive-identity-access-control-product-overview-and-insight

Working from home goes viral in the age of coronavirus
https://www.biometricupdate.com/202004/working-from-home-goes-viral-in-the-age-of-coronavirus

Idaptive Releases Major Update to Next-Gen Access Platform for Endpoint Security
https://solutionsreview.com/identity-management/idaptive-releases-major-update-to-next-gen-access-platform-for-endpoint-security/

Cyberattack on UN: Geneva and Vienna Targeted by ‘Well-Resourced’ Security Breach
https://www.ibtimes.sg/cyberattack-un-geneva-vienna-targeted-by-well-resourced-security-breach-38572

Data Privacy Day 2020: New Decade, New Threats, Same Concerns
https://datacentrereview.com/content-library/opinion/1526-data-privacy-day-2020-new-decade-new-threats-same-concerns

2019 United Nations Server Breaches Were Not Disclosed Promptly: “Troubling”
https://www.cybersecasia.net/news/2019-united-nations-server-breaches-were-not-disclosed-promptly-troubling

Our Job Isn’t Only to Protect Corporations, But Also Assist With Digital Transformations, Says CyberArk CEO
https://www.calcalistech.com/ctech/articles/0,7340,L-3785512,00.html

CyberArk Releases New ‘Just-in-Time’ Capabilities to Help Reduce Risk
https://channellife.com.au/story/cyberark-releases-new-just-in-time-capabilities-to-help-reduce-risk

How Security Keeps Up When Developers Drive Open-Source
https://dzone.com/articles/how-security-keeps-up-when-developers-drive-open-s

Cyberattack Halts Tissue Regenix’s U.S.-Based Manufacturing Operations
https://www.scmagazine.com/home/security-news/cybercrime/cyberattack-halts-tissue-regenixs-u-s-based-manufacturing-operations/

Robotic Process Automation (RPA): 5 Lessons to Learn Early
https://enterprisersproject.com/article/2020/1/rpa-robotic-process-automation-5-lessons-before-start

With 5G And IoT, It’s A New Day With New Risks
https://www.informationsecuritybuzz.com/articles/with-5g-and-iot-its-a-new-day-with-new-risks/

2020 Container Predictions
https://www.devopsdigest.com/2020-devops-containers-kubernetes-predictions-1

The Top Cybersecurity Trends That Will Shape 2020
https://www.scmagazineuk.com/top-cyber-security-trends-will-shape-2020/article/1667283

Four Ways to Keep Kubernetes’ Secrets Secret
https://dzone.com/articles/four-ways-to-keep-kubernetes-secrets-secret

10 Hot Cybersecurity Companies To Watch In 2020
https://www.crn.com/slide-shows/security/10-hot-cybersecurity-companies-to-watch-in-2020/4

CyberArk 2020 Predictions: Top Cybersecurity Trends Shaping 2020
https://vmblog.com/archive/2019/12/20/cyberark-2020-predictions-top-cybersecurity-trends-shaping-2020.aspx#.XfzmsS2ZMyl

Microsoft Fixes Login Vulnerability
https://www.foxbusiness.com/technology/microsoft-vulnerability-login-system

A Bug in Microsoft’s Login System Put Users at Risk of Account Hijacks
https://techcrunch.com/2019/12/02/microsoft-login-flaw-account-hijack/

Drones Might Pose An Emerging Security Risk: CyberArk
https://www.itwire.com/internet-of-things/drones-might-pose-an-emerging-security-risk.html

Microsoft Fixes Flaw Threatening Azure Accounts
https://www.darkreading.com/cloud/microsoft-fixes-flaw-threatening-azure-accounts/d/d-id/1336495

20 On 2020 – IT Leaders Dish Out Predictions
https://www.cio.com/article/3490468/20-on-2020-it-leaders-dish-out-predictions.html

Microsoft OAuth Flaw Opens Azure Accounts to Takeover
https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/

141 Cybersecurity Predictions For 2020
https://www.forbes.com/sites/gilpress/2019/12/03/141-cybersecurity-predictions-for-2020/#4fe9f5181bc5

Government Urges Vigilant Holiday Shopping
https://www.nbcboston.com/multimedia/Government-Urges-Vigilant-Holiday-Shopping_NECN-565175912.html

Keeping Hackers Out and Costs Low: Cybersecurity in the Public Sector
https://www.openaccessgovernment.org/cyber-security-in-the-public-sector/78477/

Insights Into Privileged Access Management
https://www.cyberark.com/wp-content/uploads/2019/11/TAG_Cyber_Security_Annual_CyberArk_Bosnian_FINAL.pdf

Prioritize Securing IT Infrastructure, Says CyberArk CEO
https://www.cnbc.com/video/2019/11/18/prioritize-securing-it-infrastructure-says-cyberark-ceo.html

Prioritizing Privilege to Protect the Public
https://www.scmagazineuk.com/prioritising-privilege-protect-public/article/1661637

Three Ways Developers Can Worry Less About Security
https://devops.com/three-ways-developers-can-worry-less-about-security/

Identity Is The Perimeter Of The Digital Business
https://www.forbes.com/sites/forbestechcouncil/2019/11/01/identity-is-the-perimeter-of-the-digital-business/#5582da6a50f4

Why Boston is a Cybersecurity Hotbed
https://sponsored.bostonglobe.com/bg-brandlab/boston-cybersecurity-hotbed/?p1=SC_Article_ReadMore

The Future of Cybersecurity: The Good, The Bad, and The Scary
https://sponsored.bostonglobe.com/bg-brandlab/the-future-of-cybersecurity/?p1=SC_Article_ReadMore

The Biggest Cybersecurity Risks Threatening Boston-Area Businesses Right Now
https://sponsored.bostonglobe.com/bg-brandlab/cybersecurity-risks-threatening-boston-businesses/?p1=SC_Article_ReadMore

Alleged State Hackers Adapting to Cover Their Tracks, Says NCSC
https://www.computerweekly.com/news/252472617/Alleged-state-hackers-adapting-to-cover-their-tracks-says-NCSC

What’s Changed: the 2019 Gartner Magic Quadrant for Access Management
https://solutionsreview.com/identity-management/whats-changed-the-2019-gartner-magic-quadrant-for-access-management/

Cybersecurity Giants Join Forces to Combat Cyberthreats Under OASIS Umbrella
https://www.zdnet.com/article/cybersecurity-firms-join-forces-to-combat-open-source-security-woes-under-oasis-umbrella/

Thinking Like An Attacker to Protect Privileged Access
https://www.govloop.com/thinking-like-an-attacker-to-protect-privileged-access/

Ecuador Data Leak Signposts A Clear Need For More Secure Public Clouds
https://www.informationsecuritybuzz.com/articles/ecuador-data-leak-signposts-a-clear-need-for-more-secure-public-clouds/

The Problem with Plugins
https://about.gitlab.com/2019/09/27/plugin-instability/

Why Biometric Authentication Is The Need of the Hour
https://www.cxotoday.com/story/why-biometric-authentication-is-the-need-of-the-hour/

Ecuador Data Breach: Data Analytics Firm Exec Held
https://www.scmagazineuk.com/update-ecuador-data-breach-data-analytics-firm-exec-held/article/1659973

Ecuador Citizens’ Data Breach Holds Lessons for Enterprises
https://www.computerweekly.com/news/252470787/Ecuador-citizens-data-breach-holds-lessons-for-enterprises

The Top Five Considerations for Securing DevOps Tools and Processes
https://www.technative.io/the-top-five-considerations-for-securing-devops-tools-and-processes/

6 Questions to Ask Once You’ve Learned of a Breach
https://www.darkreading.com/attacks-breaches/6-questions-to-ask-once-youve-learned-of-a-breach--/d/d-id/1335799?_mc=rss%5Fx%5Fdrr%5Fedt%5Faud%5Fdr%5Fx%5Fx%2Drss%2Dsimple&image_number=5

Privileged Access and the Future of Security
https://www.cso.com.au/article/666188/privileged-access-future-security/?utm_medium=rss&utm_source=sectionfeed

CyberArk’s Kevin Jermyn: Agencies Need Programmatic Approach to Ensuring Privileged Access Security
https://www.govconwire.com/2019/09/cyberarks-kevin-jermyn-agencies-need-programmatic-approach-to-ensuring-privileged-access-security/

Securing Robotic Process Automation is the New Business Priority
https://www.technative.io/securing-robotic-process-automation-is-the-new-business-priority/

5 Steps for Building a Zero-Trust Environment
https://gcn.com/articles/2019/08/26/5-steps-zero-trust.aspx

Healthcare Can’t Wait for Device Makers to Prioritize Security
https://www.healthcareitnews.com/news/healthcare-can-t-wait-device-makers-prioritize-security

How Devs Can Improve Security
https://dzone.com/articles/how-devs-can-improve-security-part-2

Organisations Still Struggle with GDPR Compliance
https://www.scmagazineuk.com/organisations-struggle-gdpr-compliance/article/1592142

Podcast: To Fix Remote Access, CyberArk Alero Ditches Passwords and VPNs
https://securityledger.com/2019/07/spotlight-podcast-to-fix-remote-access-cyberark-alero-ditches-passwords-and-vpns/

We “Cannot Stop Cyber-Attacks,” Say Over 40% of UK Orgs
https://www.infosecurity-magazine.com/news/we-cannot-stop-cyberattacks-say/

Almost a Third of European Firms Still Not Compliant with GDPR
https://www.computerweekly.com/news/252467207/Almost-a-third-of-European-firms-still-not-compliant-with-GDPR

Researcher Warns DevOps Security is Back to the Future
https://securityledger.com/2019/07/researcher-warns-devops-security-back-to-the-future/

Securing Robotic Process Automation As a Business Imperative
https://www.intelligentciso.com/2019/07/22/securing-robotic-process-automation-as-a-business-imperative/

CyberArk Brings Updates to Privileged Access Security Offering
https://searchsecurity.techtarget.com/news/252467066/CyberArk-brings-updates-to-privileged-access-security-offering

CyberArk Tightens Privileged Access Controls
https://channelnomics.com/2019/07/18/cyberark-tightens-privileged-access-controls/

Robot Account Apocalypse: RPA Risk Exploding with Adoption
https://securityledger.com/2019/07/robot-account-apocalypse-rpa-risk-exploding-with-adoption/

How Attackers Infiltrate the Supply Chain & What to Do About It
https://www.darkreading.com/risk/how-attackers-infiltrate-the-supply-chain-and-what-to-do-about-it/a/d-id/1335234

CyberArk Doubles Down On Training With Partner Program Updates
https://www.crn.com/news/security/cyberark-doubles-down-on-training-with-partner-program-updates

Best tools for single sign-on (SSO)
https://www.csoonline.com/article/3405441/best-tools-for-single-sign-on.html

Is City Ransomware the New Trend?
https://www.professionalsecurity.co.uk/news/interviews/is-city-ransomware-the-new-trend/

What Banks Can Do to Secure Systems from Cyberattacks
https://www.standardmedia.co.ke/business/article/2001332250/what-banks-can-do-to-secure-systems-from-cyberattacks

CyberArk Survey: Privileged Access is the Greatest Cloud Security Concern
https://www.israeldefense.co.il/en/node/39166

XSS Bug in Outlook for Android Patched
https://portswigger.net/daily-swig/xss-bug-in-outlook-for-android-patched

Over Reliance on Public Cloud Vendor Security Puts Data and Companies at Risk of Breach
https://www.helpnetsecurity.com/2019/06/28/public-cloud-vendor-security/

How Organizations Face Risks by Relying Too Much on Cloud Vendors for Security
https://www.techapeek.com/2019/06/27/how-organizations-face-risks-by-relying-too-much-on-cloud-vendors-for-security/

How Organizations Face Risks by Relying Too Much on Cloud Vendors for Security
https://www.techrepublic.com/article/how-organizations-face-risks-by-relying-too-much-on-cloud-vendors-for-security/#ftag=RSS56d97e7

Podcast: CyberArk Adversary Simulation – The Red Team Is Your Friend
http://tupodcast.blubrry.net/2019/06/27/ep26-cyberark-adversary-simulation-the-red-team-is-your-friend-with-shay-nahari/

CyberArk Survey Reveals Confusion Over Cloud Security Responsibilities
https://www.intelligentciso.com/2019/06/26/cyberark-survey-reveals-confusion-over-cloud-security-responsibilities/

APT10 Telco Attacks Likened to GCHQ’s Operation Socialist
https://www.itwire.com/security/apt10-telco-attacks-likened-to-gchq-s-operation-socialist.html

Chinese Hackers Linked to Global Attacks on Telcos
https://www.technewsworld.com/story/Chinese-Hackers-Linked-to-Global-Attacks-on-Telcos-86099.html

Global Cyberattack Campaign Hit Mobile Carrier Networks
https://www.darkreading.com/attacks-breaches/global-cyberattack-campaign-hit-mobile-carrier-networks-/d/d-id/1335052?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Operation Soft Cell campaign targets cellular telecom providers, points to China’s APT10
https://www.scmagazine.com/home/security-news/apts-cyberespionage/operation-soft-cell-campaign-targets-cellular-telecom-providers-points-to-chinas-apt10/

Key Findings – The Forrester Wave: IDaaS For Enterprise, Q2 2019
https://solutionsreview.com/identity-management/key-findings-the-forrester-wave-idaas-for-enterprise-q2-2019/

A Sleeping Security Threat: How to Protect Against Container Compromise
https://www.scmagazine.com/home/opinion/executive-insight/a-sleeping-security-threat-how-to-protect-against-container-compromise/

To Beat a Cybercriminal, Learn to Think Like One
https://ia.acs.org.au/article/2019/to-beat-a-cybercriminal--learn-to-think-like-one.html

Security Pro Offers Word of Caution on Container Use
https://www.itwire.com/security/security-pro-offers-word-of-caution-on-container-use.html

People-First Security
https://www.digitalbullet.in/mag/technology-june-2019

Prioritising the Security of Business-Critical Applications
https://www.itproportal.com/features/prioritising-the-security-of-business-critical-applications/

Prolonged Flipboard Breach Incident Could Make Some Users Flip Their Lids
https://www.scmagazine.com/home/security-news/data-breach/prolonged-flipboard-breach-incident-could-make-some-users-flip-their-lids/

The Rise of Biometric Authentication
https://www.techradar.com/news/the-rise-of-biometric-authentication

A Year After GDPR, What Has Changed?
https://www.informationsecuritybuzz.com/articles/a-year-after-gdpr-what-has-changed/

Prioritizing Privilege to Protect Patient Data
https://www.healthcareitnews.com/news/prioritizing-privilege-protect-patient-data

World Password Day: Industry Experts Offer Their Views
https://www.intelligentciso.com/2019/05/02/world-password-day-industry-experts-offer-their-views/

Instead of Chasing Headlines
https://www.professionalsecurity.co.uk/news/interviews/instead-of-chasing-headlines/

DZone Research: The Most Important Security Elements
https://dzone.com/articles/most-important-security-elements-part-2

Five Steps to Securing Your Business Critical Applications
https://www.technative.io/5-steps-to-securing-your-business-critical-applications/

Four Things to Know About Privileged Access Security
https://govinsider.asia/security/four-things-to-know-about-privileged-access-security/

The Secret to DevOps Secrets Management
https://jaxenter.com/devops-secrets-management-158041.html

Enterprises Fear Disruption to Business Critical Applications, Yet Don’t Prioritize Securing Them
https://www.helpnetsecurity.com/2019/03/29/securing-business-critical-applications/

How to Put Security at the Heart of Your DevOps Development Cycles
http://www.intelligentciso.com/2019/03/28/how-to-put-security-at-the-heart-of-your-devops-development-cycles/

Do You Need to Sacrifice Speed?
https://www.professionalsecurity.co.uk/news/interviews/do-you-need-to-sacrifice-speed/

Ransomware Attacks Decline but Other Targets on the Rise
https://www.computerweekly.com/microscope/news/252460232/Ransomware-attacks-decline-but-other-targets-on-the-rise

Maximising Blockchain’s Potential with Privilege Controls
https://itbrief.com.au/story/maximising-blockchain-s-potential-with-privilege-controls-cyberark

CyberArk Expert Discusses How Best to Secure the Retail Sector
http://www.intelligentciso.com/2019/03/11/cyberark-expert-discusses-how-best-to-secure-the-retail-sector/

30 Hot New Cybersecurity Products Announced At RSA Conference 2019
https://www.crn.com/slide-shows/security/30-hot-new-cybersecurity-products-announced-at-rsa-conference-2019/15

Container Escape Hack Targets Vulnerable Linux Kernel
https://threatpost.com/container-escape-hack-targets-vulnerable-linux-kernel/142407/

CyberArk Simplifies Privileged Access Security in Cloud Environments
https://www.helpnetsecurity.com/2019/03/04/cyberark-privileged-access-security/

Ransomware Attack on Israeli Users Fails Miserably Due to Coding Error
https://www.zdnet.com/article/ransomware-attack-on-israeli-users-fails-miserably-due-to-coding-error/

New Approach to IDaaS Fights Hackers on Multiple Levels
https://www.itprotoday.com/endpoint-protection/new-approach-idaas-fights-hackers-multiple-levels

Ten Tips for Securing Privileged Access
https://www.technative.io/ten-tips-for-securing-privileged-access/

Jackpotting ATM: An Emerging Threat
https://ciso.economictimes.indiatimes.com/news/jackpotting-atm-an-emerging-threat/67861705

Idaptive Looks to Reduce Identity and Access Management Friction
https://www.eweek.com/security/idaptive-looks-to-reduce-identity-and-access-management-friction

Study: CISOs Need to Take Charge of DevOps Security
https://devops.com/study-cisos-need-to-take-charge-of-devops-security/

Think Twice Before You Tweet: The Age of Social Media as ‘CNI’
https://www.itproportal.com/features/think-twice-before-you-tweet-the-age-of-social-media-as-cni/

Hack Allows Escape of Play-with-Docker Containers
https://threatpost.com/hack-allows-escape-of-play-with-docker-containers/140831/

Escaping Containers to Execute Commands on Play with Docker Servers
https://www.bleepingcomputer.com/news/security/escaping-containers-to-execute-commands-on-play-with-docker-servers/

Q&A: Here’s Why Robust ‘Privileged Access Management’ Has Never Been More Vital
https://www.lastwatchdog.com/qa-heres-why-robust-privileged-access-management-has-never-been-more-crucial/

ProgrammableWeb’s Most Clicked, Shared and Talked About APIs of 2018: Security and Privacy
https://www.programmableweb.com/news/programmablewebs-most-clicked-shared-and-talked-about-apis-2018-security-and-privacy/brief/2019/01/02

2019 TAG Cyber Security Annual Report: Privileged Access Security for Enterprise
https://lp.cyberark.com/rs/316-CZP-275/images/TAG Cyber Article .pdf

Privileged Access & the Future of Security
https://www.darkreading.com/endpoint/privileged-access-and-the-future-of-security-/d/d-id/1333489

Many Employees Have “Too Much Access” to Company Information
https://www.itproportal.com/news/many-employees-have-too-much-access-to-company-information/

Cyber Security Fears as Employees and Ex Staff Able to Access Sensitive Company Data
https://workplaceinsight.net/cyber-security-fears-as-office-workers-given-unfettered-access-to-sensitive-company-data/

Stop the Credential Thieves Before They Stop Your Business
https://www.theregister.co.uk/2018/12/19/stop_the_credential_thieves_before_they_stop_your_business/

Q&A: Taking the Work Out of Imperative RPA Cyber Security Measures
https://siliconangle.com/2018/12/13/qa-taking-work-imperative-rpa-cybersecurity-measures-reinvent/

CyberArk 2019 Predictions: The Year Ahead – Top Cyber Security Predictions
http://vmblog.com/archive/2018/12/12/cyberark-2019-predictions-the-year-ahead-top-cyber-security-predictions.aspx#.XBe13xNKhn5

Cybercrime and Malware: 2019 predictions
https://www.zdnet.com/pictures/cybercrime-and-malware-2019-predictions/

Privileged Access Management in the Spotlight
https://www.itworldcanada.com/sponsored/privileged-access-management-in-the-spotlight

Report: Pioneering Privileged Access Management
https://www.helpnetsecurity.com/2018/12/07/report-pioneering-privileged-access-management/

Seven Steps to Secure Privileged Access
https://www.scmagazine.com/home/advertise/seven-steps-to-secure-privileged-access/

Gartner Explores IT Security in First Ever Magic Quadrant for Privileged Access Management
https://www.itopstimes.com/itsec/gartner-explores-it-security-in-first-ever-magic-quadrant-for-privileged-access-management/

Make Privileged Access Security a Priority to Protect Patient Data
https://www.businesstimes.com.sg/opinion/make-privileged-access-security-a-priority-to-protect-patient-data

Why Healthcare Organisations Need a Privileged Access Management System
https://www.technative.io/why-healthcare-organisations-need-a-privileged-access-management-system

OWASP Sting: How Education Can Take the Bite out of Common Vulnerabilities
https://www.infosecurity-magazine.com/opinions/owasp-education-common/

What is the Cyber Kill Chain? Why It’s Not Always the Right Approach to Cyber Attacks
https://www.csoonline.com/article/2134037/cyber-attacks-espionage/strategic-planning-erm-the-practicality-of-the-cyber-kill-chain-approach-to-security.html

Mitigating Cyber Security Threats This Cyber Monday
https://www.techradar.com/uk/news/mitigating-cyber-security-threats-this-cyber-monday

DevOps Vendors at the Forefront in 2019
https://informationweek.com/devops/devops-vendors-at-the-forefront-in-2019/a/d-id/1333193

The Day the Polls Stand Still: An Unspoken Critical Infrastructure Threat to Election Security
https://www.entrepreneur.com/article/322820

Cyber Hygiene: A Programmatic Approach to Improving Security
https://americansecuritytoday.com/cyber-hygiene-a-programmatic-approach-to-improving-security/

Bleedingbit Vulnerabilities Put Wi-Fi Access Points at Risk
https://searchsecurity.techtarget.com/news/252451918/Bleedingbit-vulnerabilities-put-Wi-Fi-access-points-at-risk

CISO: Tips to Get the Board Onboard with Security
https://securityboulevard.com/2018/10/ciso-tips-to-get-the-board-onboard-with-security/

How AI and ML are Making Cyber Attacks More Complex and Sophisticated
https://content.techgig.com/videos/rohan-vaidya-from-cyberark-talks-about-how-ai-and-ml-are-making-cyber-attacks-more-complex-and-sophisticated/videoshow/66316413.cms

CyberArk Launches Privileged Session Management for Cloud
https://www.helpnetsecurity.com/2018/10/16/cyberark-privileged-session-manager-for-cloud/

CyberArk Launches Privileged Session Manager for Cloud
https://www.msspalert.com/cybersecurity-services-and-products/identity-and-access-management/cyberark-privileged-session-manager/

Tackling Privileged Access Security
https://gcn.com/articles/2018/10/16/privileged-access-security.aspx

CyberArk Brings Privileged Session Manager to the Cloud
http://www.eweek.com/security/cyberark-brings-privileged-session-manager-to-the-cloud

CyberArk Launches Advanced Privileged Session Management for Cloud
http://vmblog.com/archive/2018/10/15/cyberark-launches-advanced-privileged-session-management-for-cloud.aspx#.W8Yp2hNKhn5

Securing Industrial Control Systems by Closing the Air Gap Security Loophole
https://www.manufacturing.net/article/2018/10/securing-industrial-control-systems-closing-air-gap-security-loophole

How to Attract and Keep IT Security Talent
https://enterprisersproject.com/article/2018/10/how-attract-and-keep-it-security-talent

Report: Government is Underutilizing Social Media
https://federalnewsradio.com/technology-main/2018/10/engaged-in-social-media-if-not-you-are-missing-the-boat/

Morning Cybersecurity: The Social Network
https://www.politico.com/newsletters/morning-cybersecurity/2018/09/28/def-con-voting-village-report-reactions-356499

Securing Social Media – A Critical Step For Robust CNI
https://www.informationsecuritybuzz.com/articles/securing-social-media/

How To Bring The Retail Sector Back Into Fashion
https://www.informationsecuritybuzz.com/articles/how-to-bring-the-retail-sector-back-into-fashion/

DevOps and the Dark Pools of Security Technical Debt
https://devops.com/devops-and-the-dark-pools-of-security-technical-debt/

Are You the Biggest Threat to Your Employer?
https://www.networksasia.net/article/are-you-biggest-threat-your-employer.1536551877

Q&A With Nasdaq, ForeScout & CyberArk
https://www.nasdaq.com/article/qampa-with-nasdaq-forescout-amp-cyberark-cm1019277

How to Eliminate Secret Zero and Stop Nesting Secrets
https://dzone.com/articles/how-to-eliminate-secret-zero-and-stop-nesting-secr

Securing Privileged Accounts In ICS
http://www.iaasiaonline.com/software-networks/securing-privileged-accounts-in-ics-cyberark/

Expert Insight: Security and the Changing DevOps Landscape
https://www.gigabitmagazine.com/big-data/expert-insight-security-and-changing-devops-landscape

CNI Threat Starts with Social Media
https://www.professionalsecurity.co.uk/news/interviews/cni-threat-starts-with-social-media/

To Fight Cyber Attacks, Think Like a Hacker
https://www.tnp.sg/news/views/fight-cyber-attacks-think-hacker

The Hack of a Colorado Life Insurer Highlights Growing Cyber Threat
http://lifeannuityspecialist.com/c/2063033/242813/hack_colorado_life_insurer_highlights_growing_cyber_threat

DevSecOps: How to Conquer 3 Big Culture Challenges
https://enterprisersproject.com/article/2018/8/devsecops-how-conquer-3-big-culture-challenges

CyberArk Launches SAP Certified Privileged Access Security Solution
https://www.helpnetsecurity.com/2018/08/06/cyberark-privileged-access-security-solution-2/

CyberArk Launches SAP-Certified Privileged Access Security Solution
https://securitybrief.com.au/story/cyberark-launches-sap-certified-privileged-access-security-solution/

Insider Threats Rise as Businesses Struggle with Cybercrime
https://www.cbronline.com/news/insider-threats-cybercrime

Why Cryptojacking Malware May be a Sign of More Serious Intrusion
https://www.idgconnect.com/abstract/31066/why-cryptojacking-malware-maybe-sign-intrusion

Exploring the Dynamics of the Attacker Economy
https://www.helpnetsecurity.com/2018/07/23/attacker-economy/

Optiv Security Launches Privileged Access Managed Service
http://www.eweek.com/security/optiv-security-launches-privileged-access-managed-service

Beware of Digital Pickpockets: How to Secure Cryptographic Keys
https://www.cso.com.au/article/643273/beware-digital-pickpockets-how-secure-cryptographic-keys/

The Rise Of Crypto-Miners: Q&A With CyberArk’s Shay Nahari
https://www.cshub.com/security-strategy/news/the-rise-of-crypto-miners-qa-with-cyberarks-shay-nahari

Dealing with Cyber Threats: A Look at Privileged Access Management and Vaulting Technology
https://www.moneycontrol.com/news/technology/dealing-with-cyber-threats-a-look-at-privileged-account-management-and-vaulting-technology-2635511.html

Kubernetes Skills Demand Continues to Soar – But are Organisations Dropping the Ball on Security?
https://www.cloudcomputing-news.net/news/2018/jun/19/kubernetes-skills-demand-continues-soar-are-organisations-dropping-ball-security/

Are You the Biggest Threat to Your Employer?
http://www.itsecurityguru.org/2018/06/15/biggest-threat-employer/

Golden SAML: How Can It Abuse SAML Authentication Protocol?
https://searchsecurity.techtarget.com/answer/Golden-SAML-How-can-it-abuse-SAML-authentication-protocol

Artificial Intelligence Offers Cost, Scale Advantages For Securing Cloud Applications, Workloads, Experts Say
ttps://www.crn.com/news/security/300105121/artificial-intelligence-offers-cost-scale-advantages-for-securing-cloud-applications-workloads-experts-say.htm

The Driverless Threat
http://www.professionalsecurity.co.uk/news/transport/the-driverless-threat/

How to Secure Cryptographic Keys
https://www.scmagazineuk.com/how-to-secure-cryptographic-keys/article/763109/

Privileged Account Security Never Goes Out of Style
http://blog.retail.org.au/newsandinsights/privileged-account-security-never-goes-out-of-style

CyberArk Shows How ‘Shadow Admins’ Can be Created in Cloud Environments
https://securityboulevard.com/2018/05/cyberark-shows-how-shadow-admins-can-be-created-in-cloud-environments/

10 Security Experts On What The Industry Doesn’t Get About GDPR
https://www.crn.com/slide-shows/security/300103986/10-security-experts-on-what-the-industry-doesnt-get-about-gdpr.htm

ATM Attacks: How Hackers are Going for Gold
https://www.helpnetsecurity.com/2018/05/11/atm-attacks/

Interview: CyberArk Tells Why DevOps Must Adopt ‘Secure Innovation by the Numbers’
https://securitybrief.com.au/story/interview-cyberark-tells-why-devops-must-adopt-secure-innovation-numbers/

Twitter Bug Stores Passwords in Plain Text
https://www.infosecurity-magazine.com/news/twitter-bug-stores-passwords-in/

DevOps in Government: Balancing Velocity and Security
https://www.meritalk.com/devops-in-government-balancing-velocity-and-security/

Cyber Security: Whose Job is it Anyway?
https://www.hrtechnologist.com/articles/strategy/cyber-security-whose-job-is-it-anyway/

CyberArk Warns of ‘Shadow Admins’ in Cloud Environments
https://searchcloudsecurity.techtarget.com/news/252439753/CyberArk-warns-of-shadow-admins-in-cloud-environments

CRN Exclusive: CyberArk Goes All-In On MSSPs With Multi-Tenancy, Pay-As-You-Go Pricing
https://www.crn.com/news/security/300101956/crn-exclusive-cyberark-goes-all-in-on-mssps-with-multi-tenancy-pay-as-you-go-pricing.htm

Cloud Credentials: New Attack Surface for Old Problem
https://threatpost.com/cloud-credentials-new-attack-surface-for-old-problem/131304/

CRN 2018 Partner Program Guide: 5-Star Security Vendors
https://crn.com/slide-shows/security/300101561/2018-partner-program-guide-5-star-security-vendors.htm/pgno/0/22

DevOps Security Watch: Three Trends To Track In 2018
https://www.informationsecuritybuzz.com/articles/devops-security-watch-three-trends-to-track-in-2018/

CyberArk Acquires Vaultive for Cloud Access Security Tech
https://securityboulevard.com/2018/03/cyberark-acquires-vaultive-cloud-access-security-tech/

Should Government Social Media Accounts be Treated as Critical Infrastructure?
https://gcn.com/articles/2018/03/16/social-media-critical-infrastructure.aspx

Cryptocurrency: Just for Tax Avoidance & Paying Cyber-Hold-Ups Anonymously?
https://www.scmagazineuk.com/cryptocurrency-just-for-tax-avoidance-paying-cyber-hold-ups-anonymously/article/750236/

CRN 2018 Security 100: 20 Coolest Identity Management and Data Protection Vendors
https://www.crn.com/slide-shows/security/300099971/2018-security-100-20-coolest-identity-management-and-data-protection-vendors.htm/pgno/0/4

IT Pros Don’t Learn From Cyberattacks, Study
https://www.scmagazine.com/study-finds-it-pros-dont-learn-from-mistakes-after-a-breach/article/748775/

On the Front Lines: Don Welch, Penn State University
https://www.togglemag.com/case-studies/don-welch-penn-state-university/

Firms Failing to Learn from Cyber Attacks
http://www.computerweekly.com/news/252435869/Firms-failing-to-learn-from-cyber-attacks

DoD’s Shanahan Preaches Religion on Cybersecurity
https://www.meritalk.com/articles/dods-shanahan-preaches-religion-on-cybersecurity/

Secrets at Risk as DevOps Goes Mainstream
https://www.infosecurity-magazine.com/opinions/devops-mainstream/

Grappling with DevOps Security
https://www.cso.com.au/article/633432/grappling-devops-security/

Unprepared for Data Breach Notification Laws? Here’s What You Need to Do
http://www.afr.com/news/special-reports/cyber-security/unprepared-for-data-breach-notification-laws-heres-what-you-need-to-do-20180202-h0swuz

Cybertech Presents: The Next Cyber Revolution
http://www.israeldefense.co.il/en/node/32912

Benefits of GDPR Will Depend on Enforcement – Cybersecurity Firm
https://www.independent.ie/business/technology/benefits-of-gdpr-will-depend-on-enforcement-cybersecurity-firm-36545697.html

GSA Begins Tightening Federal Contractor Cybersecurity Requirements
https://www.meritalk.com/articles/gsa-begins-tightening-federal-contractor-cybersecurity-requirements/

Interview with Cyber Luminary Udi Mokady of CyberArk
https://lp.cyberark.com/rs/316-CZP-275/images/2018 TAG Cyber_Udi Mokady Interview.pdf

Podcast: Uber Breach Puts Focus on Securing DevOps Secrets
https://securityledger.com/2017/11/spotlight-podcast-uber-breach-puts-focus-securing-devops-secrets/

Infosec Expert Viewpoint: DevOps Security
https://www.helpnetsecurity.com/2017/11/27/infosec-expert-viewpoint-devops-security/

Golden SAML Attack Lets Attackers Forge Authentication to Cloud Apps
https://www.bleepingcomputer.com/news/security/golden-saml-attack-lets-attackers-forge-authentication-to-cloud-apps/

SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’
https://threatpost.com/saml-post-intrusion-attack-mirrors-golden-ticket/128993/

BoundHook Hooking Is Invisible to Windows 10’s PatchGuard
http://www.securityweek.com/boundhook-hooking-invisible-windows-10s-patchguard

DevOps Secrets Tripped up Uber – They’re Not Alone
https://securityledger.com/2017/11/podcast-germany-wants-kids-watches-destroyed-one-nation-trolls/

CyberArk Automates and Simplifies Protection Against Privileged Account Exploitation
http://vmblog.com/archive/2017/11/15/cyberark-automates-and-simplifies-protection-against-privileged-account-exploitation.aspx#.Wh2U97T82YU

Automated Risks – Secrets of DevOps Security Exposed
https://diginomica.com/2017/11/07/automated-risks-secrets-devops-security-exposed/

The Public Sector Cyber Security Sticking Plaster
http://www.cbrgovernment.com/healthcare/public-sector-cyber-security-sticking-plaster/

Massachusetts Leads the Fight for a More (Cyber) Secure Future
http://www.xconomy.com/boston/2017/10/24/massachusetts-leads-the-fight-for-a-more-cyber-secure-future/

BoundHook: Microsoft downplays Windows systems exploit technique
https://www.theregister.co.uk/2017/10/18/boundhook_windows_10_exploit_cyberark/

BoundHook Attack Exploits Intel Skylake MPX Feature says CyberArk Labs
https://threatpost.com/boundhook-attack-exploits-intel-skylake-mpx-feature/128517/

CyberArk Discovers New Rootkit-Enabling Hooking Technique For Intel Processors
http://www.tomshardware.com/news/cyberark-boundhook-rootkit-intel-processors,35715.html

Weakness In Windows Defender Lets Malware Slip Through Via SMB Shares
https://www.darkreading.com/perimeter/weakness-in-windows-defender-lets-malware-slip-through-via-smb-shares/d/d-id/1330021

Want to Be a Better Security Leader? Embrace Your Red Team
https://www.csoonline.com/article/3229357/leadership-management/want-to-be-a-better-security-leader-embrace-your-red-team.html

“Illusion Gap” Attack Bypasses Windows Defender
http://www.securityweek.com/illusion-gap-attack-bypasses-windows-defender

“Illusion Gap” Attack Bypass Tricks OS Into Running Malicious Code
https://threatpost.com/windows-defender-bypass-tricks-os-into-running-malicious-code/128179/

New “Illusion Gap” Attack Bypasses Windows Defender Scans
https://www.bleepingcomputer.com/news/security/new-illusion-gap-attack-bypasses-windows-defender-scans/

Complying with New York’s New Cybersecurity Regulations
http://www.rmmagazine.com/2017/09/20/complying-with-new-yorks-new-cybersecurity-regulations/

Open Source Secrets Management Solution for DevOps
https://www.helpnetsecurity.com/2017/09/08/infosec-products-week-september-8-2017/

DevOps Security Management Goes Central
https://www.securitynow.com/author.asp?section_id=654&doc_id=736104&

Open Source CyberArk Conjur Released
http://www.devopsdigest.com/open-source-cyberark-conjur-released

Bank of America insider trading highlights how critical enterprise data security is
https://siliconangle.com/blog/2017/08/17/bank-america-insider-trading-story-highlights-importance-enterprise-data-security/

Companies are buying bitcoin to pay off hackers, says top cybersecurity CEO
https://www.cnbc.com/2017/08/15/companies-are-buying-bitcoin-to-pay-off-hackers-says-cyberark-ceo.html

Partners: DevOps Presents Next Wave Of Opportunity Around Identity And Access Management
http://www.crn.com/news/security/300089141/partners-devops-presents-next-wave-of-opportunity-around-identity-and-access-management.htm?itc=ticker

Given the Chance and Skills, Would You Hack Your Employer?
http://www.cityam.com/268610/given-chance-and-skills-would-you-hack-your-employer

Launch Your Own Cybersecurity Sprint: 30 Days to Improved Security
https://www.helpnetsecurity.com/2017/07/17/cybersecurity-sprint/

GhostHook Attack Reveals Kernel-Level Threat in 64-Bit Windows Systems
https://securityintelligence.com/news/ghosthook-attack-reveals-kernel-level-threat-in-64-bit-windows-systems/

GhostHook Attack Targets Windows 10 Vulnerability
https://www.infosecurity-magazine.com/news/ghosthook-attack-targets-windows/

Does Cloud Automation Create New Vulnerabilities for the Enterprise?
https://www.cso.com.au/article/621041/does-cloud-automation-create-new-vulnerabilities-enterprise/

Cyber Attackers Targeting the Keys to the Cloud Kingdom
https://cloudtweaks.com/2017/06/cyber-attackers-targeting-the-keys-to-the-cloud-kingdom/

‘GhostHook’ Foils Windows 10 64-bit’s Kernel Protection
http://www.darkreading.com/vulnerabilities---threats/ghosthook-foils-windows-10-64-bits-kernel-protection/d/d-id/1329205

New GhostHook Attack Bypasses Windows 10 PatchGuard Protections
http://thehackernews.com/2017/06/ghosthook-windows-10-hacking.html?m=1

Every Corporation Today Is Under Attack All Day Long From Hackers, This CEO Tells Jim Cramer
https://www.thestreet.com/story/14164194/2/corporate-boards-must-sharpen-their-cybersecurity-skills.html

30 Notable IT Executive Moves
http://www.crn.com/slide-shows/security/300086426/30-notable-it-executive-moves-may-2017.htm/pgno/0/20

WannaCry Is ‘Different From Anything We’ve Ever Seen,’ Security Experts Say
http://www.crn.com/news/security/300085301/wannacry-is-different-from-anything-weve-ever-seen-security-experts-say.htm

Cyber Hackers and Digital Defences: Gone Phishing… So, Everyone, On Guard
http://www.straitstimes.com/tech/gone-phishing-so-everyone-on-guard

CRN 2017 Women of the Channel
http://wotc.crn.com/wotc2017-details.htm?w=374

Thanks to WannaCry Ransomware, A Dark Day for Cybersecurity
http://www.itbusinessedge.com/blogs/data-security/thanks-to-wannacry-ransomware-a-dark-day-for-cybersecurity.html

Before WannaCry: 5 Nasty Computer Worms That Spread Quickly And Caused Big Time Damage
http://www.crn.com/slide-shows/security/300085261/before-wannacry-5-nasty-computer-worms-that-spread-quickly-and-caused-big-time-damage.htm

Held hostage: The Rise of Ransomware
http://www.information-age.com/held-hostage-rise-ransomware-123466218/

Could Your Chatbot Spill the Beans?
https://www.itwire.com/security/78060-could-your-chatbot-spill-the-beans.html

It’s a Privilege to Improve Healthcare IT Security
https://www.itwire.com/security/77788-it%E2%80%99s-a-privilege-to-improve-healthcare-it-security.html

Security Leaders Need to Sprint Before Getting Forced to Scramble
http://www.csoonline.com/article/3190892/leadership-management/security-leaders-need-to-sprint-before-getting-forced-to-scramble.html

Industry 4.0 Held to Ransom
http://www.manufacturingglobal.com/technology/1174/Industry-40-held-to-ransom

Brexit and the spectre of cyber-attacks: Are you ready for Article 50 phishing?
http://www.cityam.com/262362/brexit-and-spectre-cyber-attacks-you-ready-article-50

Yahoo fallout: Minted authentication cookies raise concerns
http://searchsecurity.techtarget.com/news/450415121/Yahoo-fallout-Minted-authentication-cookies-raise-concerns

2017 Security 100: 15 Coolest Identity Management And Data Protection Vendors
http://www.crn.com/slide-shows/security/300084086/2017-security-100-15-coolest-identity-management-and-data-protection-vendors.htm/pgno/0/5

Cyber Security And The Insider: Is The Threat What It Appears?
http://www.hstoday.us/columns/best-practices/blog/cyber-security-and-the-insider-is-the-threat-what-it-appears/ac98bbc300e5cc4bdc94cebc60cc07d9.html

Survey Roundup: Cyber Job Hunters Lack the Right Skills
http://blogs.wsj.com/riskandcompliance/2017/02/17/survey-roundup-cyber-job-hunters-lack-the-right-skills/?mod=djemRiskCompliance&mg=id-wsj&mg=id-wsj

6 Cool Security Products From the 2017 RSA Conference
http://www.channelpronetwork.com/slideshow/6-cool-security-products-2017-rsa-conference?page=6#main-content

Insider threat solution for rapid response to in-progress attacks
https://www.helpnetsecurity.com/2017/02/16/insider-threat-solution-rapid-response-progress-attacks/

Hot products at RSA 2017
http://www.networkworld.com/article/3168917/security/hot-products-at-rsa-2017.html#slide12

Keeping You Safe Online
http://www.necn.com/on-air/as-seen-on/WEB-CEO-Corner-A_NECN-412508063.html

Carahsoft Adds CyberArk Privileged Account Security Platform to Army IT Enterprise Contract
http://blog.executivebiz.com/2017/01/carahsoft-adds-cyberark-privileged-account-security-platform-to-army-it-enterprise-contract/

Four Cyber Trends to Watch in 2017
https://www.govtechworks.com/four-cyber-trends-to-watch-in-2017/#gs.v5Q3nZ0

Cyber Attackers Targeted Our Trust, Not Just an Election
http://www.xconomy.com/boston/2017/01/12/cyber-attackers-targeted-our-trust-not-just-an-election/