Secure developer workstations with least privilege

Secure Developer Workstations Without Slowing Them Down

| | endpoint
Fueled by automation, the adoption of DevOps processes and more, the role of the developer has become increasingly important and widespread for enterprises going through digital transformation. Developers need access to privileged credentials in order... The post Secure Developer Workstations Without Slowing Them Down appeared first on CyberArk ... Read More

Are Password Managers Good Enough to Protect You?

| | endpoint, events, Surveys
October is National Cybersecurity Awareness Month and, over the past few weeks, we’ve written blogs highlighting this year’s themes: Own it. Secure it. Protect it. We wrote about the opportunity and risk of emerging technologies... The post Are Password Managers Good Enough to Protect You? appeared first on CyberArk ... Read More

How to Implement Successful Endpoint Security for macOS

| | endpoint
The belief that there are no viruses or types of malware for macOS goes back to the beginning of Mac OS X at the very beginning of this millennium. Unfortunately, this is a myth. The... The post How to Implement Successful Endpoint Security for macOS appeared first on CyberArk ... Read More
Five Tools for a Defense-in-Depth Strategy for Endpoints

Five Tools for a Defense-in-Depth Strategy for Endpoints

| | endpoint
Today’s digital workforce looks very different than it did 10 – even five – years ago. Employees, contractors and vendors are spread across multiple locations, some work remotely, and most use a variety of mobile... The post Five Tools for a Defense-in-Depth Strategy for Endpoints appeared first on CyberArk ... Read More
State and Local Government Ransomware Attacks

A Troubled City Reminds Us That Ransomware Is Here to Stay

Since early May, Baltimore has been crippled by a massive ransomware attack that has held many of the city’s IT systems hostage. The attack has effectively “frozen” thousands of government computers, causing everything from real... The post A Troubled City Reminds Us That Ransomware Is Here to Stay appeared first ... Read More
Administrative Rights Figure 1

Spotlight on Administrator Rights and Privileged Credential Theft

You recognize the importance of defense-in-depth and use multiple layers of security to protect your organization’s most important data and assets. But, like many organizations, you could be overlooking a critical step in containing cyber... The post Spotlight on Administrator Rights and Privileged Credential Theft appeared first on CyberArk ... Read More

Trickbot Update: From Credential Theft to Business Disruption

| | endpoint
Researchers recently discovered a new variant of the original Trickbot that turns the banking Trojan into a remote application credentials thief. Developed in 2016, the original TrickBot was one of the more recent banking Trojans,... The post Trickbot Update: From Credential Theft to Business Disruption appeared first on CyberArk ... Read More

Keep Security in Mind for a Successful Windows 10 Upgrade: Five Steps

| | endpoint
Last month, Microsoft announced that Windows 10 is now installed on more than 800 million active devices around the globe. Windows 10 deployments continue to gain momentum as enterprises aim to take advantage of Windows... The post Keep Security in Mind for a Successful Windows 10 Upgrade: Five Steps appeared ... Read More

Keep Security in Mind for a Successful Windows 10 Upgrade: Five Steps

| | endpoint
Last month, Microsoft announced that Windows 10 is now installed on more than 800 million active devices around the globe. Windows 10 deployments continue to gain momentum as enterprises aim to take advantage of Windows... The post Keep Security in Mind for a Successful Windows 10 Upgrade: Five Steps appeared ... Read More

The Future of Passwords Isn’t Looking Bright – But We Still Have to Secure Them

| | endpoint
Many security and IT professionals consider passwords to be the weakest link in their company’s defenses – and that’s for a good reason. The lack of strong passwords, a failure to change (or rotate) passwords... The post The Future of Passwords Isn’t Looking Bright – But We Still Have to ... Read More