Missing the Forest for the Trees: Top 5 CISO Pitfalls in Cybersecurity

There is a lack of focus in cyber security.  This rarely stems from lack of hard work, desire, technical ability or aspiration.  Many cybersecurity leaders and teams voice concern around lack of funding, minimal executive…
The post Missing … Continue reading Missing the Forest for the Trees: Top 5 CISO Pitfalls in Cybersecurity

CyberArk Introduces Privileged Access Security Assessment Tool

Privileged access security is a key pillar of an effective security program. We take our role as a trusted adviser to our customers very seriously and are constantly looking for new ways to help evolve…
The post CyberArk Introduces Privileged Access … Continue reading CyberArk Introduces Privileged Access Security Assessment Tool

Spotlight on Administrator Rights and Privileged Credential Theft

You recognize the importance of defense-in-depth and use multiple layers of security to protect your organization’s most important data and assets. But, like many organizations, you could be overlooking a critical step in containing cyber…
The … Continue reading Spotlight on Administrator Rights and Privileged Credential Theft

Version 10.9 Extends Security to Privileged Business Users

We recently announced version 10.9 of the CyberArk Privileged Access Security Solution. This release is the first enterprise-grade Privileged Access Security solution to add functionality to extend security and credential protection for privileged busi… Continue reading Version 10.9 Extends Security to Privileged Business Users

The Business Case for Securing Robotic Process Automation

As part of their ongoing digital transformation journeys, enterprises are turning to Robotic Process Automation (RPA) to enhance efficiency and productivity. According to Deloitte, 53 percent of organizations have started to leverage RPA to robotize…… Continue reading The Business Case for Securing Robotic Process Automation

Biometric Authentication – Our ‘Unique Human Identities’ Under Attack

 Editor’s Note: In late 2018, CyberArk published five cybersecurity predictions for 2019. This deep-dive blog series will examine each prediction in detail to help organizations stay on top of emerging threats and out-innovate and out-maneuv… Continue reading Biometric Authentication – Our ‘Unique Human Identities’ Under Attack

Privileged Account Management Best Practices for Social Media Security

Social media plays a vital role in an enterprise’s marketing strategy, helping to build brand awareness, provide real-time customer support and launch new products faster than ever before. Social media has also emerged as a…
The post Privileged… Continue reading Privileged Account Management Best Practices for Social Media Security

What March Madness Can Teach Us About Handling a Data Security Breach

With March Madness now fully upon us, it’s time to take a few lessons learned from “The Tournament” and apply them to our lives in cyber security. What can March Madness teach us about handling…
The post What March Madness Can Teach… Continue reading What March Madness Can Teach Us About Handling a Data Security Breach

5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business

The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age…
The post 5 Keys to Securi… Continue reading 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business