CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in CRN’s 2019 Partner Program Guide. This marks the second consecutive year that CyberArk has received this prestigious designation. This recognition…
The post … Continue reading CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business

The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age…
The post 5 Keys to Securi… Continue reading 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business

KuppingerCole Analysts Names CyberArk an Overall Privileged Access Management Leader

Today, independent analyst firm KuppingerCole Analysts released its 2019 “Leadership Compass: Privileged Access Management” report. Maintaining our overall leadership position for four consecutive years, CyberArk surpassed 19 other evaluate… Continue reading KuppingerCole Analysts Names CyberArk an Overall Privileged Access Management Leader

New DevOps eBook: Managing Application Secrets – What Do Developers Really Want?

There’s no doubt that DevOps methodologies offer significant strategic and competitive advantages. But, these benefits are not without risk. With faster code delivery at scale, the attack surface can grow rapidly with exponentially more secrets….. Continue reading New DevOps eBook: Managing Application Secrets – What Do Developers Really Want?

China’s AI Strategy and its Security Implications

Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China’s AI strategy, commercial, government, and military. There are numerous security — and national security — implications…. Continue reading China’s AI Strategy and its Security Implications

NIST Guidance for Financial Services: Protecting Privileged Access is a Business Imperative

Success in today’s financial services market means constantly innovating to meet evolving customer expectations, such as enhanced personalization, mobile banking and cloud-based digital service options. Yet digital disruption and deeper customer … Continue reading NIST Guidance for Financial Services: Protecting Privileged Access is a Business Imperative

Hacking Construction Cranes

Construction cranes are vulnerable to hacking: In our research and vulnerability discoveries, we found that weaknesses in the controllers can be (easily) taken advantage of to move full-sized machines such as cranes used in construction sites and factories. In the different attack classes that we’ve outlined, we were able to perform the attacks quickly and even switch on the controlled… Continue reading Hacking Construction Cranes

CISO View Insights from the Global 1000: Five Steps for Integrating Security with DevOps

The Challenge – Security vs. Velocity While organizations are increasingly adopting DevOps tools and methodologies and seeing tremendous business benefits, it is not always clear that security remains a priority. The truth is that, while…
The p… Continue reading CISO View Insights from the Global 1000: Five Steps for Integrating Security with DevOps