Blog Posts

  • Secrets, out: Why workload identity is essential for AI agent security

    Secrets, out: Why workload identity is essential for AI agent security

    AI agents aren’t waiting in the wings anymore. They’re approving payments, spinning up cloud resources, and pulling sensitive data at machine speed. Blink, and a swarm of them has already acted a...

    Read Blog
  • 47-day TLS certificates: What’s changing and how to prepare

    47-day TLS certificates: What’s changing and how to prepare

    Trust is the foundation of the digital world. Every time a customer visits a website, processes a financial transaction, or connects to a business application, that trust is validated by TLS...

    Read Blog
  • CyberArk named a Leader in the 2025 Gartner® Magic Quadrant™ for PAM

    CyberArk named a Leader in the 2025 Gartner® Magic Quadrant™ for PAM

    It’s one thing to excel. It’s another to consistently redefine the path forward. We’re proud to announce that CyberArk has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged...

    Read Blog
  • 96 machines per human: The financial sector’s agentic AI identity crisis

    96 machines per human: The financial sector’s agentic AI identity crisis

    What if you hired about 100 new employees for every one you already had, and then, on a whim, gave them all admin rights? Sure, these fresh hires would likely be brilliant and hungry to...

    Read Blog
  • Securing AI agents: privileged machine identities at unprecedented scale

    Securing AI agents: privileged machine identities at unprecedented scale

    Earlier in 2025, an AI agent named Claudius made headlines when it insisted it was human, promising to deliver products in “a blue blazer and red tie.” Quirky? Sure. But beneath the strange...

    Read Blog
  • AI agents in financial services: The hidden org chart

    AI agents in financial services: The hidden org chart

    Do you know who’s really working for your bank, and whether they’re quietly rewriting your org chart behind the scenes? AI agents are quickly becoming “first-class citizens” in financial services,...

    Read Blog
  • When AI agents become admins: Rethinking privileged access in the age of AI

    When AI agents become admins: Rethinking privileged access in the age of AI

    From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents now perform tasks that previously required a human with privileged access. AI...

    Read Blog
  • The invisible threat: Machine identity sprawl and expired certificates

    The invisible threat: Machine identity sprawl and expired certificates

    One unmanaged machine identity—whether a TLS certificate, SSH key, code signing certificate, or API secret—that’s all it takes to crash your website, halt transactions, and leave customers...

    Read Blog
  • CyberArk Privilege Cloud Version 14.7 Release

    CyberArk Privilege Cloud Version 14.7 Release

    CyberArk Privilege Cloud 14.7 improves user experience and enhances security with the new Secure Access space, Identity Protection, Threat Detection, Risk Management and more.

    Read Blog
  • Sandworm in the supply chain: Lessons from the Shai-Hulud npm attack on developer and machine identities

    Sandworm in the supply chain: Lessons from the Shai-Hulud npm attack on developer and machine identities

    Do you know why Shai-Hulud should raise your hackles? Unless you’ve spent time on Arrakis in Frank Herbert’s Dune or the npm ecosystem this month, the name Shai-Hulud might not ring a bell. In...

    Read Blog
  • Persuasion engineering: how to influence humans, LLMs, and AI agents

    Persuasion engineering: how to influence humans, LLMs, and AI agents

    We’ve spent decades treating persuasion like an art—something you could master if you had charisma, practice, or luck. Lawyers use it to hone arguments. Marketers use it to craft taglines. On the...

    Read Blog
  • A practical guide to AI-ready machine identity governance in finance

    A practical guide to AI-ready machine identity governance in finance

    Across financial services operations, machine identities play critical roles, but in many organizations, these cryptographic keys, API tokens, certificates, and service accounts remain chronically...

    Read Blog
  • The AI revolution in financial cybersecurity

    The AI revolution in financial cybersecurity

    Financial cybersecurity has never been a static discipline. Over two decades in this industry, I’ve seen it transform from a compliance checkbox to a cornerstone of business resilience—usually...

    Read Blog
  • Identity Security: Why Buyers Choose CyberArk

    Identity Security: Why Buyers Choose CyberArk

    In the world of identity security, organizations evaluating solutions want to understand why CyberArk stands out as the top choice. Leaders aren’t just looking for a rundown of capabilities – they...

    Read Blog
  • Is autofill safe? Clickjacking risks and security tradeoffs explained

    Is autofill safe? Clickjacking risks and security tradeoffs explained

    When new security research hits the headlines, it often sparks a predictable wave of worry: should we turn off features we rely on? Should we rethink basic workflows? That’s exactly the case with...

    Read Blog
  • User Access Reviews and Compliance: The Auditor’s Perspective

    User Access Reviews and Compliance: The Auditor’s Perspective

    This blog was originally published by Zilla Security, now a CyberArk Company and may reference legacy product names that are now part of the CyberArk IGA portfolio. Protecting company assets and...

    Read Blog
  • Effective User Access Reviews

    Effective User Access Reviews

    This blog was originally published by Zilla Security, now a CyberArk Company and may reference legacy product names that are now part of the CyberArk IGA portfolio. You want to get the most out of...

    Read Blog
  • Why secret sprawl may be your biggest security threat (and how to help fix it)

    Why secret sprawl may be your biggest security threat (and how to help fix it)

    Picture this: You’re having your morning coffee when your phone buzzes with the kind of alert that makes security professionals break into a cold sweat. A single API key, leaked on GitHub months...

    Read Blog
  • Cheaters never win: large-scale campaign targets gamers who cheat with StealC and cryptojacking

    Cheaters never win: large-scale campaign targets gamers who cheat with StealC and cryptojacking

    A sprawling cyber campaign is turning gamers’ hunger to gain an edge into a massive payday for threat actors who are leveraging over 250 malware samples to steal credentials and cryptocurrencies....

    Read Blog
  • Defeating Microsoft EPM in the Race to Admin: a Tale of a LPE vulnerability

    Defeating Microsoft EPM in the Race to Admin: a Tale of a LPE vulnerability

    Introduction Not too long ago I read an interesting blogpost by SpecterOps about Microsoft EPM that got my attention as I was not aware of this Microsoft product/feature. It was interesting to...

    Read Blog
  • loading
    Loading More...