The CyberArk Blog

  • Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities...

    Read Blog
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • The Rise of the Machines and the Growing AI Identity Attack Surface

    The Rise of the Machines and the Growing AI Identity Attack Surface

    In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and...

    Read Blog
  • The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    AI and Deep Fake Technology v. The Human Element The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been...

    Read Blog
  • Zero Standing Privileges: The Essentials

    Zero Standing Privileges: The Essentials

    In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with...

    Read Blog
  • CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...

    Read Blog
  • Navigating Cloud Security: A Shared Responsibility

    Navigating Cloud Security: A Shared Responsibility

    Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at...

    Read Blog
  • 5 Strategies for Setting the Right Cybersecurity KPIs

    5 Strategies for Setting the Right Cybersecurity KPIs

    Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...

    Read Blog
  • Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

    Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

    Okay, so you’re a security leader at your enterprise – congratulations! It’s a big, challenging role, as you know too well. You or a colleague are likely responsible for securing the cloud and...

    Read Blog
  • CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the...

    Read Blog
  • What ‘Passwordless’ Really Means for Privileged Access Management

    What ‘Passwordless’ Really Means for Privileged Access Management

    Privileged access management (PAM) programs aim to secure the highest-risk access in an organization, including using privileged credentials like passwords, SSH keys and application secrets. So,...

    Read Blog
  • Why Implementing Identity Security Doesn’t Have to Be Complicated

    Why Implementing Identity Security Doesn’t Have to Be Complicated

    Every organization is different, with its own unique needs, challenges and goals. That means that IT solutions, and especially IT security, must be complex tools that are highly configurable and...

    Read Blog
  • Serving Secure Access: Inside the Privileged Access Ice Cream Parlor

    Serving Secure Access: Inside the Privileged Access Ice Cream Parlor

    Imagine standing in your favorite ice cream parlor, gazing at myriad flavors chilling behind the counter. The choices are tantalizing, from traditional vanilla and chocolate to a swirl of the two....

    Read Blog
  • Identity Security: The Keystone of Trust

    Identity Security: The Keystone of Trust

    A few weeks ago, my wife asked me why stopping threat actors from impacting our lives is so difficult. In this digital age, the necessity to connect online brings inherent exposure to...

    Read Blog
  • Cloud Migration Simplified: SaaS Secrets and PAM Strategy

    Cloud Migration Simplified: SaaS Secrets and PAM Strategy

    In the era of rapid digital transformation, organizations are prioritizing cloud transformation projects to enhance their operational agility, scalability and cost efficiency. However, this shift...

    Read Blog
  • Financial Highwire: The Critical Role of Identity Security in Finance

    Financial Highwire: The Critical Role of Identity Security in Finance

    In the highwire act of the financial services sector, identity security serves as the essential safety net, meticulously engineered to intercept any missteps before they precipitate a fall. Just...

    Read Blog
  • CIO POV: Building Resilience in a Complex Threat Landscape

    CIO POV: Building Resilience in a Complex Threat Landscape

    As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself...

    Read Blog
  • Securing a Lifeline: Why Identity Security is Paramount in Healthcare

    Securing a Lifeline: Why Identity Security is Paramount in Healthcare

    In the intricate healthcare ecosystem, cybersecurity is akin to the human immune system – a vital defense that safeguards the body from external and internal threats. Healthcare cybersecurity is...

    Read Blog
  • Triage Your Cloud Security: Risk Prioritization Methods

    Triage Your Cloud Security: Risk Prioritization Methods

    It’s a familiar post-disaster scene in seemingly every television medical drama. A ferry has crashed, or a train has derailed. Patients flood into the ER, each requiring urgent medical attention....

    Read Blog
  • Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Data theft, data protection and the leakage of passwords or secrets are the top two cloud security concerns for 2,400 cybersecurity experts, according to the recently released CyberArk 2024...

    Read Blog
  • IMPACT 2024: It’s Time for a Paradigm Shift in Identity Security

    IMPACT 2024: It’s Time for a Paradigm Shift in Identity Security

    What a week! We just wrapped up CyberArk IMPACT 2024, the world’s largest identity security-focused conference. It was amazing to be joined by thought leaders and practitioners from around the...

    Read Blog
  • loading
    Loading More...