RPA: Citizen Developers – at the Corner of Speed and Value

| | Security and Risk
Gartner’s definition: “A citizen developer is a user who creates new business applications for consumption by others using development and runtime environments sanctioned by corporate IT.” The idea of a citizen developer is edging its... The post RPA: Citizen Developers – at the Corner of Speed and Value appeared first ... Read More

Law Firms Need to Prioritize Privilege to Protect Client Information

| | Security and Risk
It’s well understood that law offices have access to extremely valuable client information and secrets – just look at the case of the Panama Papers, which implicated many high profile individuals and political leaders with... The post Law Firms Need to Prioritize Privilege to Protect Client Information appeared first on ... Read More

5 Reasons to Prioritize Privileged Access Management (PAM)

| | Security and Risk
Finding the right aspects of cybersecurity to prioritize can present significant challenges. Organizations often lack sufficient resources to deal with emerging threats from both a personnel and budget standpoint. With the limited budgets they do... The post 5 Reasons to Prioritize Privileged Access Management (PAM) appeared first on CyberArk ... Read More
The Launch at Impact: Privileged Access Security Solution Version 11

The Launch at Impact: Privileged Access Security Solution Version 11

The 13th annual and largest ever CyberArk Impact Americas event officially kicked off in Chicago, bringing together customers, partners and a ton of cyber security experts to discuss all things privileged access security. One of... The post The Launch at Impact: Privileged Access Security Solution Version 11 appeared first on ... Read More
The Business Case for Securing Robotic Process Automation

The Business Case for Securing Robotic Process Automation

As part of their ongoing digital transformation journeys, enterprises are turning to Robotic Process Automation (RPA) to enhance efficiency and productivity. According to Deloitte, 53 percent of organizations have started to leverage RPA to robotize... The post The Business Case for Securing Robotic Process Automation appeared first on CyberArk ... Read More

Q&A: Threat Analytics, Detection and Response in the Cloud

A WIRED article detailing a nation state attack recently caught my attention. The piece introduced the concept of “breakout time,” which is essentially the time it takes for a cyber attacker to go from an... The post Q&A: Threat Analytics, Detection and Response in the Cloud appeared first on CyberArk ... Read More

Privileged Account Management Best Practices for Social Media Security

| | Security and Risk
Social media plays a vital role in an enterprise’s marketing strategy, helping to build brand awareness, provide real-time customer support and launch new products faster than ever before. Social media has also emerged as a... The post Privileged Account Management Best Practices for Social Media Security appeared first on CyberArk ... Read More

Zero Trust Part II: The Evolution of Trust and Five Key Considerations

| | Security and Risk
This is the second half of a two part series on Zero Trust. Find the first part here. The Russian proverb ‘trust, but verify’ was not only used for Nixon’s presidential campaign, but it’s been... The post Zero Trust Part II: The Evolution of Trust and Five Key Considerations appeared ... Read More
Zero-Trust Part I: The Evolution of Perimeter Security  

Zero-Trust Part I: The Evolution of Perimeter Security  

| | Security and Risk
A Brief History on the Zero-trust Model Established back in 2010 by industry analyst John Kindervag, the “zero-trust model” is centered on the belief that organizations should not automatically trust anything inside or outside its... The post Zero-Trust Part I: The Evolution of Perimeter Security appeared first on CyberArk ... Read More

CyberArk Adds the Privileged Access Security Solution v10.4 to the DoDIN APL

It’s been nearly a decade since the Department of Defense (DoD) created the Department of Defense Information Network Approved Products List (DoDIN APL) to highlight tried and tested solutions that specifically address government security concerns.... The post CyberArk Adds the Privileged Access Security Solution v10.4 to the DoDIN APL appeared ... Read More