A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

The world is changing quickly. Digital transformation initiatives and new services from cloud providers are creating an explosion of identity-based permissions. Through the eyes of an attacker, each cloud identity represents a potential opportunity and… Continue reading A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47% since 2018 and the average annual…
The post Prehistoric … Continue reading Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Time to Re-examine Remote Access After VPN Password Leak

Just days ago, a list of plaintext usernames, passwords and IP addresses for more than 900 Pulse Secure VPN servers was published online along with SSH keys for each server, a list of all local…
The post Time to Re-examine Remote Access After VPN Pas… Continue reading Time to Re-examine Remote Access After VPN Password Leak

The Gartner 2020 Magic Quadrant for PAM is Here!

Today, we announced that CyberArk has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management.1 CyberArk was positioned both highest in ability to execute and furthest in completeness of vision,…
The post The Gartner 2… Continue reading The Gartner 2020 Magic Quadrant for PAM is Here!

7 Best Practices for Securely Enabling Remote Work

At Impact Live 2020 we spent a lot of time discussing strategies for maintaining a strong cybersecurity posture in the age of remote work. Today’s users need flexibility to do their jobs efficiently with the…
The post 7 Best Practices for Secur… Continue reading 7 Best Practices for Securely Enabling Remote Work

What Twitter Attack Says on Human Nature, Social Engineering

Last week, Twitter suffered a breach that led to the compromise of numerous high-profile accounts, including those of Barak Obama, Joe Biden, Jeff Bezos and Elon Musk. I took the opportunity to speak with Nir…
The post What Twitter Attack Says on Hum… Continue reading What Twitter Attack Says on Human Nature, Social Engineering

Top 5 Features of v11.5: Flexibility for the New Normal

The world is changing rapidly and privileged access management (PAM) is no exception. Today, we released the latest version of CyberArk Privileged Access Security Solution (v11.5), which contains several new features to help organizations adapt…
The … Continue reading Top 5 Features of v11.5: Flexibility for the New Normal