It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic shift, this push…
The post It’s I… Continue reading It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked inside that…
The post Hard-Coded Credentials: The Not-So-Se… Continue reading Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in…
The post Attacker Productivity: Exploit Misconfigured Identitie… Continue reading Attacker Productivity: Exploit Misconfigured Identities in the Cloud

People, Process and Technology: Six Best Practices for Cloud Least Privilege

If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services…
The post People, Process and Technology: Six Best Pr… Continue reading People, Process and Technology: Six Best Practices for Cloud Least Privilege

Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Editor’s Note: This is part three of a blog series on securing privileged access and identities in the cloud. Part 1: Five Best Practices for Securing Privileged Access and Identities for the Cloud Management Console Part…
The post Secure Your Cloud … Continue reading Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

The world is changing quickly. Digital transformation initiatives and new services from cloud providers are creating an explosion of identity-based permissions. Through the eyes of an attacker, each cloud identity represents a potential opportunity and… Continue reading A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

The Gartner 2020 Magic Quadrant for PAM is Here!

Today, we announced that CyberArk has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management.1 CyberArk was positioned both highest in ability to execute and furthest in completeness of vision,…
The post The Gartner 2… Continue reading The Gartner 2020 Magic Quadrant for PAM is Here!

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing workloads. This ecosystem makes organizations deeply dependent on their cloud infrastructure with the most popular… Continue reading DIY: Hunting Azure Shadow Admins Like Never Before

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing workloads. This ecosystem makes organizations deeply dependent on their cloud infrastructure with the most popular… Continue reading DIY: Hunting Azure Shadow Admins Like Never Before

Top 5 Features of v11.5: Flexibility for the New Normal

The world is changing rapidly and privileged access management (PAM) is no exception. Today, we released the latest version of CyberArk Privileged Access Security Solution (v11.5), which contains several new features to help organizations adapt…
The … Continue reading Top 5 Features of v11.5: Flexibility for the New Normal