Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Elevating Cloud Security With Well-Architected Practices

It’s said that life truly begins when you step out of your comfort zone. Living in California provides me with many options for hiking and trekking, a perfect backdrop for spending time with nature and enjoying it with friends and family. As a hiking and nature enthusiast, I have done many moderately challenging trails in and around the Bay Area – my comfort zone.

Ransomware's PLAYing a Broken Game

The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is because reverse engineering the malware would be a Sisyphean task full of anti-analysis techniques. That said, it might come as a surprise that the malware crashes quite frequently when running.

How to Check If Someone Is Using My Identity

Nowadays, digital transactions and virtual interactions aren’t exactly optional. People can’t keep their information off the web due to professional reasons, and many processes are exponentially more convenient through an online profile. With the influx of data stored on the web, it’s a veritable treasure trove for malicious hackers. Bits and pieces of the personal details we nonchalantly put in online profiles can lead to severe identity theft cases.

GenAI's Role in Upskilling to Close the Cybersecurity Skills Gap

The cybersecurity industry has a major people problem: it doesn’t have enough of them. The global shortage of more than 4 million cybersecurity workers isn’t a new phenomenon, but as digital and cloud initiatives accelerate, the effects are even more profound. This is especially true in the identity security domain.

EP 44 - The Rise of Prompt Engineering: How AI Fuels Script Kiddies

In this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills.

Why Identity Security Requires More Than ITDR

Identity Threat Detection and Response (ITDR) is one of many aspects of an effective identity security program. Yet despite what some detection and response-focused vendors may argue, ITDR is not a silver-bullet solution to prevent identity-centric attacks. Such a thing doesn’t exist. In fact, modern data breaches, industry analyst perspectives and compliance requirements make it crystal clear that organizations need more than ITDR to build an identity security program.

Digital Lending: Identity Verification for Paperless Loans

The financial landscape has undergone a monumental transformation, ushering in an era of digital lending that departs from traditional methodologies to embrace more streamlined and tech-driven processes. This paradigm shift has not only modernized the lending landscape but has also redefined how individuals access credit and financial services.

Employment Verification & Background Verification Process - What's new

Background verification involves gathering details about a candidate’s work history, criminal record, academic qualifications, and proof of residence. This step is critical in the lengthy and intricate process of hiring and onboarding. It means that applicants might experience a delay as employers thoroughly review their employment backgrounds. The transition from completing background checks to reaching a “good to hire” decision usually spans 3-5 days.