It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic shift, this push…
The post It’s I… Continue reading It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Making Azure Cloud Environments Even More Secure with CyberArk

A recent survey of technology executives at large firms showed that Microsoft Azure continues to be the most popular provider of public cloud services, even as Amazon leads the market overall in terms of revenue…
The post Making Azure Cloud Environme… Continue reading Making Azure Cloud Environments Even More Secure with CyberArk

The Blurring Line Between Privileged and Non-Privileged Users

“Identity truly  is the new perimeter” was one of the big topics  at Impact Live. This is because  organizations are dealing with a new set of operational and security challenges related to introducing more endpoints…
The p… Continue reading The Blurring Line Between Privileged and Non-Privileged Users

What Twitter Attack Says on Human Nature, Social Engineering

Last week, Twitter suffered a breach that led to the compromise of numerous high-profile accounts, including those of Barak Obama, Joe Biden, Jeff Bezos and Elon Musk. I took the opportunity to speak with Nir…
The post What Twitter Attack Says on Hum… Continue reading What Twitter Attack Says on Human Nature, Social Engineering

Security for the Modern OT Environment

Operational Technology (OT) – the hardware and software that’s used to monitor, detect and control changes to devices, processors and events of industrial equipment are popular targets for cyber attackers…and for good reason. Unauthor… Continue reading Security for the Modern OT Environment

The Friday 15: All About PAM in 15 Minutes

As a security professional, you’re busier than ever, juggling work, life and everything in between. With convenience being of the utmost importance to us these days, we are excited to launch The Friday 15.  This…
The post The Friday 15: Al… Continue reading The Friday 15: All About PAM in 15 Minutes

Native, Interactive Login Aids Privileged Session Management

We recently explored how native session management can help organizations secure workflows and protect privileged access while giving users the flexibility to work with their favorite applications and tools. As companies search for tools that…
The po… Continue reading Native, Interactive Login Aids Privileged Session Management

When a CLI Falls for an Attacker

A few months ago, I was working on research that involved spanning up and down multiple virtual machines in AWS and used AWS CLI in order to manage them. I decided to make a small…
The post When a CLI Falls for an Attacker appeared first on Security … Continue reading When a CLI Falls for an Attacker

KuppingerCole Analysts Name CyberArk “the One to Beat” in Privileged Access Management

Today, independent analyst firm KuppingerCole Analysts released its 2020 “Leadership Compass: Privileged Access Management” report, naming CyberArk the Overall Leader. CyberArk has held this leadership position for five consecutive years in… Continue reading KuppingerCole Analysts Name CyberArk “the One to Beat” in Privileged Access Management

Reduce Risk with CyberArk and Rapid7 Integrations

It’s well-known in the world of cybersecurity that you can’t secure what you don’t know exists. With today’s evolving threat landscape, it’s never been more of a challenge or a necessity to be able to…
The post Reduce Ri… Continue reading Reduce Risk with CyberArk and Rapid7 Integrations