Secure developer workstations with least privilege

Secure Developer Workstations Without Slowing Them Down

| | endpoint
Fueled by automation, the adoption of DevOps processes and more, the role of the developer has become increasingly important and widespread for enterprises going through digital transformation. Developers need access to privileged ...

Are Password Managers Good Enough to Protect You?

| | endpoint, events, Surveys
October is National Cybersecurity Awareness Month and, over the past few weeks, we’ve written blogs highlighting this year’s themes: Own it. Secure it. Protect it. We wrote about the opportunity and risk ...

How to Implement Successful Endpoint Security for macOS

| | endpoint
The belief that there are no viruses or types of malware for macOS goes back to the beginning of Mac OS X at the very beginning of this millennium. Unfortunately, this is ...

Strong Authentication for Endpoint Security: 3 Perspectives

Authentication solutions have been around for years. I actually started my cyber career working on one of the original and best two-factor (2FA) products – SecurID. Over the decades, the tech we ...
Kaspersky

Busted: Kaspersky AV Tracks Your Every Click

Kaspersky Lab’s endpoint security products track your web activity. And it allowed any other website to track you ...
Security Boulevard

Biometric Authentication Key to Remote Access for Vendors

Many organizations today rely on contracted remote vendors to manage critical systems, freeing themselves up to focus on their own core competencies. However, the fact that these vendors operate remotely further breaks ...
Five Tools for a Defense-in-Depth Strategy for Endpoints

Five Tools for a Defense-in-Depth Strategy for Endpoints

| | endpoint
Today’s digital workforce looks very different than it did 10 – even five – years ago. Employees, contractors and vendors are spread across multiple locations, some work remotely, and most use a ...
State and Local Government Ransomware Attacks

A Troubled City Reminds Us That Ransomware Is Here to Stay

Since early May, Baltimore has been crippled by a massive ransomware attack that has held many of the city’s IT systems hostage. The attack has effectively “frozen” thousands of government computers, causing ...
Administrative Rights Figure 1

Spotlight on Administrator Rights and Privileged Credential Theft

You recognize the importance of defense-in-depth and use multiple layers of security to protect your organization’s most important data and assets. But, like many organizations, you could be overlooking a critical step ...
Version 10.9 Extends Security to Privileged Business Users

Version 10.9 Extends Security to Privileged Business Users

We recently announced version 10.9 of the CyberArk Privileged Access Security Solution. This release is the first enterprise-grade Privileged Access Security solution to add functionality to extend security and credential protection for ...
Loading...