The importance of a zero trust-based approach to identity security

97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move assets to the cloud, increase third-party access to corporate resources, and enab… Continue reading The importance of a zero trust-based approach to identity security

CyberArk Identity Security helps enterprises adapt and embrace a risk-based strategy

CyberArk announced availability of new subscriptions, programs and tools designed to accelerate organizations’ Identity Security initiatives and time to business impact. These new offerings complement CyberArk’s Identity Security portfolio, which is ce… Continue reading CyberArk Identity Security helps enterprises adapt and embrace a risk-based strategy

Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files

CyberArk researchers have released BlobHunter, an open-source tool organizations can use to discover Azure blobs containing sensitive files they have inadvertently made public. The cloud storage misconfiguration problem The many advantages of using the… Continue reading Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files

How do I select a PAM solution for my business?

In order for organizations to prevent becoming the next victim of a breach due to unauthorized third-party user access, as has happened in prominent recent breaches, a strong security posture built around privileged access management (PAM) and identity… Continue reading How do I select a PAM solution for my business?

CyberArk, Forescout and Phosphorus help orgs secure their IoT devices

CyberArk announced it is working with Forescout and Phosphorus to enable organizations to secure the increasing number of IoT devices and technologies resulting from digital business transformation. Customers can significantly reduce risk using the joi… Continue reading CyberArk, Forescout and Phosphorus help orgs secure their IoT devices

Remove excessive cloud permissions with CyberArk Cloud Entitlements Manager

CyberArk announced CyberArk Cloud Entitlements Manager, a privilege-based, artificial intelligence-powered service designed to strengthen the security of cloud environments. Through continuous monitoring of cloud access, CyberArk enforces least privile… Continue reading Remove excessive cloud permissions with CyberArk Cloud Entitlements Manager

CyberArk Alero enhancements provide secure privileged access for remote users

CyberArk announced new advancements for CyberArk Alero that enable remote users to securely access critical systems managed by CyberArk from any mobile device – including non-smartphones. There are nearly 1.3 billion feature phones, or non-smartphones,… Continue reading CyberArk Alero enhancements provide secure privileged access for remote users

CyberArk acquires IDaptive to provide SaaS delivered innovation with a security-first approach

CyberArk, the global leader in privileged access management, announced it has acquired Santa Clara, California-based IDaptive. Together, CyberArk and Idaptive will deliver the industry’s only modern identity platform with a security-first approach. As … Continue reading CyberArk acquires IDaptive to provide SaaS delivered innovation with a security-first approach