PAM for Servers and VMs

5 Ways to Secure Your Windows Servers and Detect Advanced Threats Faster

As details of the recent SolarWinds supply chain attack continue to surface, we’re beginning to understand just how far these motivated attackers went to avoid attention and detection. What’s clear is that ...
A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

The world is changing quickly. Digital transformation initiatives and new services from cloud providers are creating an explosion of identity-based permissions. Through the eyes of an attacker, each cloud identity represents a ...
The code Dennis Nedry used to shut down Jurassic Park's security system

Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47% since 2018 and ...
Privileged Access Management

Time to Re-examine Remote Access After VPN Password Leak

Just days ago, a list of plaintext usernames, passwords and IP addresses for more than 900 Pulse Secure VPN servers was published online along with SSH keys for each server, a list ...
Privileged Access Management

The Gartner 2020 Magic Quadrant for PAM is Here!

Today, we announced that CyberArk has been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management.1 CyberArk was positioned both highest in ability to execute and furthest in ...
Privileged Access Management

7 Best Practices for Securely Enabling Remote Work

At Impact Live 2020 we spent a lot of time discussing strategies for maintaining a strong cybersecurity posture in the age of remote work. Today’s users need flexibility to do their jobs ...
Social Engineering

What Twitter Attack Says on Human Nature, Social Engineering

Last week, Twitter suffered a breach that led to the compromise of numerous high-profile accounts, including those of Barak Obama, Joe Biden, Jeff Bezos and Elon Musk. I took the opportunity to ...
Privileged Access Management and Identity Access Management

A Look Back at the Impact Live 2020: Our Largest Impact Yet

As our CyberArk team wraps up a banner week of Impact Live – the world’s largest gathering of privileged access management (PAM) and identity and access management (IAM) professionals – we’re reflecting ...