Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Sovereignty: Balancing Residency Requirements and Access Rights

Global organizations – and the data they collect and use on a daily basis – exist today both within and beyond the traditional physical boundaries of countries. They may have cloud infrastructure that spans the world, but local laws and regulations can still have a big impact on how data needs to be stored and accessed, even if it’s in the cloud.

Securing the Web Browser in an Identity-focused Threat Landscape

For more than 30 years, we’ve been living in a world where one of the most widely-used applications is the web browser. Despite being designed primarily for consumer use, browsers have become essential to how enterprises operate – serving as the connective tissue between identities, applications and data. And yet, despite all of the advancements leading to today’s digital and cloud-centric world, one of the least secure applications is … the browser.

EP 30 - Securing Data Amid the AI Gold Rush

Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating.

PAM Automation Scripts: Don't Forget to Secure Admin Credentials

While IT executives understand the essential role privileged access management (PAM) solutions play in their organization’s overall security strategy, they’ve also continued to ask their PAM administrators to do more with less resources. To meet these additional asks, PAM admins have automated routine PAM tasks using scripts. PAM automation scripts can significantly lessen the burden on PAM admins and enable organizations to scale PAM usage across their entire enterprise.

The Importance of Visibility | CYBR Pride

We are so proud to share CYBR Pride Employee Resource Group members Luke Thomas, Ani King and Fayssal Chenna as they discuss the importance of visibility and what it means for the LGBTQIA+ community. Listen to them talk about the power of representation and how we can all contribute to creating a safe space for everyone.

The future of security is identity and with CyberArk, the future of identity is secure

The future of security is identity, and with CyberArk, the future of identity is secure. Learn how CyberArk helps secure your organization against identity-based cyberattacks, with intelligent privilege controls for all identities – human and machine.

Top Six Identity Security Risks Compounding Cyber Debt and Expanding the Attack Surface

The prolonged period of low-capital costs and widely available funding may be over, yet digital adoption persists as business leaders seek to unlock efficiencies and innovation everywhere. This is driving exponential but often unsecure identity growth in the enterprise and putting existing levels of cyber debt at risk of compounding as investment in digital and cloud initiatives continues to outpace cybersecurity spend.