Deconstructing Identity Security
Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration...
Read Blog
Six Takeaways from Recent Ransomware Attacks
2022 ransomware attack learnings can inform 2023 cybersecurity strategies, helping organizations combat threats and reduce risk with greater confidence. The CyberArk 2022 Identity Security Threat...
Read Blog
Meet PCI DSS Compliance and Protect Cardholder Data with PAM Controls
The 2022 holiday online shopping season is shaping up to be a busy one. An estimated 63.9 million people will shop this Cyber Monday, while global eCommerce transactions are expected to climb 15%...
Read Blog
Why Strong Passwords Alone Won’t Stop Identity-Based Attacks
You can buy almost anything online without leaving the couch now. Need groceries? Check. A holiday? Check. Even a new car? It will magically appear in your driveway — no haggling required!...
Read Blog
5 Defense-in-Depth Layers for Enabling Secure Access
Cybersecurity is one of many industries that love jargon. As in the medical and legal professions, complex topics often get crunched into digestible phrases, with the “stickiest” of terms...
Read Blog
Unpacking the Uber Breach
In the days following the September 15 Uber breach disclosure, much has been written about how one, allegedly 18-year-old attacker was able to successfully infiltrate the ridesharing giant’s IT...
Read Blog
Identity Security in Action at Diamond Trust Bank
For more than 70 years, customers in East Africa have trusted Diamond Trust Bank (DTB) for their banking needs. Listed on the Nairobi Securities Exchange (NSE), the leading regional bank is an...
Read Blog
Why SOC 2 Compliance Is a Matter of (Zero) Trust
SaaS solutions are now so entwined in business users’ daily routines that they seem to meld into one experience — or simply put, “the way I work.” Yet the reality is there are many disparate...
Read Blog
How to Fast-Track Your PAM Deployment for Rapid Risk Reduction
Maybe your security team is facing an upcoming audit. Maybe you’ve failed one and need to address the audit findings. Or maybe you’re working to improve cyber readiness in the face of ransomware...
Read Blog