80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft, a CyberArk research reveals. While the adoption of web ap… Continue reading 80% of organizations experienced employees misusing and abusing access to business apps

Code42 Incydr Flows accelerates incident response for insider risk events

Code42 announced Incydr Flows, a series of actions that are automated and triggered by the Code42 Incydr product to effectively respond to different types of insider risk events. Incydr Flows are designed to monitor, contain, educate or resolve events … Continue reading Code42 Incydr Flows accelerates incident response for insider risk events

Elevating cyber resilience and tackling government information security challenges

Esti Peshin is VP, General Manager, Cyber Division, Israel Aerospace Industries (IAI). Previously, she served 11 years in the Israeli Defense Forces, in an elite technology unit, where she was Deputy Director. Peshin recently spoke at Cyber Week 2021 i… Continue reading Elevating cyber resilience and tackling government information security challenges

CyberArk Identity Security Platform enhancements secure risky access and broaden identity protection

CyberArk announced major advancements to the CyberArk Identity Security Platform to help secure high-risk access and broaden protection across cloud and hybrid environments. Global organizations of all sizes can benefit from CyberArk’s comprehensive, f… Continue reading CyberArk Identity Security Platform enhancements secure risky access and broaden identity protection

Can your MFA implementations stymie MFA bypass attacks?

Shay Nahari, Head of Red-Team services at CyberArk, says that they’ve been increasingly asked by customers to probe their multi-factor authentication (MFA) defenses, which lead them to pinpoint four main attack vectors used by threat actors to ci… Continue reading Can your MFA implementations stymie MFA bypass attacks?

How do I select an identity management solution for my business?

According to a recent survey, the pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and zero trust security. A large number of companies will continue to have a maj… Continue reading How do I select an identity management solution for my business?