Security Technical Influencer​

Making Azure Cloud Environments Even More Secure with CyberArk

A recent survey of technology executives at large firms showed that Microsoft Azure continues to be the most popular provider…

5 months ago

Source Code Leak Lesson: Secure Development Environments

Once again we are seeing how vulnerable and easily development environments can be exploited with the recent news of a…

5 months ago

7 Best Practices for Securely Enabling Remote Work

At Impact Live 2020 we spent a lot of time discussing strategies for maintaining a strong cybersecurity posture in the…

5 months ago

DIY: Hunting Azure Shadow Admins Like Never Before

TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing…

5 months ago

The Blurring Line Between Privileged and Non-Privileged Users

“Identity truly  is the new perimeter” was one of the big topics  at Impact Live. This is because  organizations are…

5 months ago

A Look Back at the Impact Live 2020: Our Largest Impact Yet

As our CyberArk team wraps up a banner week of Impact Live – the world’s largest gathering of privileged access…

5 months ago

Masking Malicious Memory Artifacts – Part II: Insights from Moneta

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth…

5 months ago

Security for the Modern OT Environment

Operational Technology (OT) – the hardware and software that’s used to monitor, detect and control changes to devices, processors and…

5 months ago

Are You Ready for Impact Live?  7 Reasons to Register Today

On July 21 and 22, CyberArk will host Impact Live, a virtual version of CyberArk Impact – the premier event…

5 months ago

Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth…

5 months ago