October is National Cybersecurity Awareness Month: Do Your Part. Meet Pam and #BeCyberSmart
October is National Cybersecurity Awareness Month (#NCSAM). Now in its 17th year, the month-long event promotes cybersecurity best practices and resources to help citizens stay safe and secure online. This year’s theme, “Do Your Part ... Read More
Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident
Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47% since 2018 and the average annual ... Read More
The Blurring Line Between Privileged and Non-Privileged Users
“Identity truly is the new perimeter” was one of the big topics at Impact Live. This is because organizations are dealing with a new set of operational and security challenges related to introducing more endpoints ... Read More
A Look Back at the Impact Live 2020: Our Largest Impact Yet
As our CyberArk team wraps up a banner week of Impact Live – the world’s largest gathering of privileged access management (PAM) and identity and access management (IAM) professionals – we’re reflecting back on the ... Read More
You’ve Heard of Social Distancing? Now Try Risk Distancing
In recent months, social distancing has played a star role in virtually every aspect of our personal and professional lives. Most of us are working from home. In short order, parents were transformed into teachers ... Read More
Securing Success: Reporting PAM “Wins” Back to the Business
The director of Identity and Access Management (IAM) is fundamentally responsible for ensuring controls are in place to protect access to sensitive assets within the organization. This includes all aspects of identity, access and authentication ... Read More
4 Ways Privileged Access Management Secures Remote Workers
Employees around the world are working hard to remain productive, but, as the mantra taking hold of the internet goes, “People are not working from home; they are at home during a crisis trying to ... Read More
FBI Warns of Major Spike in Cyber Attacks
Domestic cyber criminals and nation-state attackers alike are capitalizing on this time of uncertainty – and remote workers are a prime target. Tonya Ugoretz, deputy Assistant Director of the FBI Cyber Division, recently spoke at ... Read More
Enabling Secure Workforce Productivity with Native Privileged Session Management
From user-friendly web apps like Salesforce to IT-centered functions such as Windows Remote Desktop Protocol (RDP), today’s workplace tools can be extremely powerful. While a mix of both modern and traditional tools and technologies can ... Read More
Security with Extended Berkeley Packet Filter and PAM
Extended Berkeley Packet Filter (ePBF) has been circulating the developer arena for quite some time. The original BPF was developed nearly three decades ago by US national laboratory research scientists as an architecture for Unix ... Read More

