David Puner

  • CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro –...

    Read Blog
  • CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro –...

    Read Blog
  • Theresa Payton on Identity Threats and the Chief ‘Influence’ Security Officer

    Theresa Payton on Identity Threats and the Chief ‘Influence’ Security Officer

    You’re reading the CyberArk blog (and we thank you for that), so you’re likely familiar with the name Theresa Payton. The cybersecurity visionary, first female White House CIO, best-selling author...

    Read Blog
  • Theresa Payton on Identity Threats and the Chief ‘Influence’ Security Officer

    Theresa Payton on Identity Threats and the Chief ‘Influence’ Security Officer

    You’re reading the CyberArk blog (and we thank you for that), so you’re likely familiar with the name Theresa Payton. The cybersecurity visionary, first female White House CIO, best-selling author...

    Read Blog
  • Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

    Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

    ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might...

    Read Blog
  • Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

    Synthetic Identity: When AI and ML Crunch (Your) Harvested Data

    ChatGPT knows a lot about Len Noe, CyberArk’s resident technical evangelist, white hat hacker and biohacker. The biohacker piece of his title is a nod to the fact that Noe is transhuman (you might...

    Read Blog
  • Why Shutting Off SMS 2FA Makes Sense

    Why Shutting Off SMS 2FA Makes Sense

    Twitter’s recent decision to turn off SMS two-factor authentication (2FA) for non-Twitter Blue users created a stir. While media and tech pundits questioned the company’s motives, many users...

    Read Blog
  • Why Shutting Off SMS 2FA Makes Sense

    Why Shutting Off SMS 2FA Makes Sense

    Twitter’s recent decision to turn off SMS two-factor authentication (2FA) for non-Twitter Blue users created a stir. While media and tech pundits questioned the company’s motives, many users...

    Read Blog
  • Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Since launching last spring, the CyberArk Trust Issues Podcast has covered a range of top-of-mind cybersecurity subjects. Whether you’re interested in CISO perspectives, cutting-edge threat...

    Read Blog
  • Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Since launching last spring, the CyberArk Trust Issues Podcast has covered a range of top-of-mind cybersecurity subjects. Whether you’re interested in CISO perspectives, cutting-edge threat...

    Read Blog
  • Deutsche Telekom CSO on the New Rules of Data Privacy

    Deutsche Telekom CSO on the New Rules of Data Privacy

    The dramatic uptick in data breaches these last few years, fueled by pandemic-era changes and the rise of remote work, have made consumers even more wary about sharing their data and relinquishing...

    Read Blog
  • Deutsche Telekom CSO on the New Rules of Data Privacy

    Deutsche Telekom CSO on the New Rules of Data Privacy

    The dramatic uptick in data breaches these last few years, fueled by pandemic-era changes and the rise of remote work, have made consumers even more wary about sharing their data and relinquishing...

    Read Blog
  • CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...

    Read Blog
  • CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...

    Read Blog
  • 5 Identity Security Considerations for Updating Software

    5 Identity Security Considerations for Updating Software

    Updating software is the final cyber-smart behavior promoted by Cybersecurity Awareness Month 2022 organizers – and an important one to emphasize as we close out the month. For IT security teams,...

    Read Blog
  • 5 Identity Security Considerations for Updating Software

    5 Identity Security Considerations for Updating Software

    Updating software is the final cyber-smart behavior promoted by Cybersecurity Awareness Month 2022 organizers – and an important one to emphasize as we close out the month. For IT security teams,...

    Read Blog
  • Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    The productivity secrets of highly effective leaders fascinate me – how they’re able to juggle numerous responsibilities, while still finding time to sharpen their skills. Everyone gets the same...

    Read Blog
  • Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    The productivity secrets of highly effective leaders fascinate me – how they’re able to juggle numerous responsibilities, while still finding time to sharpen their skills. Everyone gets the same...

    Read Blog
  • loading
    Loading More...