Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2023

Quanta Services Protects Privilege In Over 200 Subsidiaries | CyberArk

Quanta is a specialized contracting services company that delivers comprehensive infrastructure solutions for the utility, renewable energy, communications, pipeline, and energy industries. Founded in 1997 when four companies merged, Quanta has grown to become a $12 billion organization. See how CyberArk helped them enhance their security and reduce demand on IT teams.

Healthfirst Applies An Identity Security First Approach To Implement Zero Trust | CyberArk

Healthfirst’s unique advantage is to put members first by partnering closely on shared goals with its broad network of providers. Healthfirst is also a pioneer of the value-based care model, where hospitals and physicians are paid based on patient outcomes. See how CyberArk helped them reduce security costs with solutions like federated identity control.

Brazilian Judiciary Partners With CyberArk To Implement Intelligent Privilege Controls | CyberArk

Unpredictable, complex and urgent cybersecurity threats remain the principal concern for businesses from the largest enterprises to the newest start-ups. In Brazil, an effort to update and streamline the justice system demanded a fresh look at security, and identity management. See how CyberArk helped them reduce the area off attack of for their endpoints.

Turkcell Protects Millions Of Customers With CyberArk| CyberArk

Emre Tanrıverdioğlu has a daunting task. As the Identity and Management Operations Manager at Turkcell, he is charged with to protecting 40 million customers across Turkey, Ukraine, Belarus and Northern Cyprus. In addition, he needs to safeguard 300,000 network devices and 40,000 employee and partner identities. See how CyberArk helped them reduce the area off attack of for their endpoints.

Identity Security Trends, Priorities & Product Innovations Part 3 | CyberArk

What are today’s biggest trends in Identity Security and which security investments should your organization prioritize? CyberArk General Manager, Chen Bitan, answers these questions and more. Chen also introduced a new market-leading products in the areas of Cloud Privilege Security and Secrets Management. Following this, CyberArk Chief Product Officer, Peretz Regev, and CyberArk Vice Presidents of Product Management Karen Eldor and Yair Sade, shared demonstrations of the Identity Security Platform Shared Services - two new market-leading products.

The Endpoint Security Gap | Are You Leaving the Door Open for Attackers?

By 2022, Gartner projects endpoint protection platforms will surpass firewall equipment as the largest source of information security software spending. However, these platforms aren’t typically built with privileged attackers in mind and leave a major endpoint security gap.

No More Cookies for You | Attacking and Defending Credentials in Chromium-Based Browsers

Web-based applications have become essential to life and work, but they’re vulnerable to attackers. While researching this topic, CyberArk developed a new tool to extract sensitive data from Chromium’s memory and created a comprehensive browser protection plan to implement in CyberArk Endpoint Privilege Manager.

Highlights From Impact Israel 2022

CyberArk Impact Israel 2022 brought Israel's cybersecurity industry together to hear from identity security experts at CyberArk and other industry leaders. Our audience obtained essential knowledge about CyberArk and emerging trends in identity security, which included the latest technologies and best practices to protect their organization from cyberattacks.

Identity Security Trends, Priorities & Product Innovations Part 2 | CyberArk

What are today’s biggest trends in Identity Security and which security investments should your organization prioritize? CyberArk General Manager, Chen Bitan, answers these questions and more. Chen also introduced a new market-leading products in the areas of Cloud Privilege Security and Secrets Management. Following this, CyberArk Chief Product Officer, Peretz Regev, and CyberArk Vice Presidents of Product Management Karen Eldor and Yair Sade, shared demonstrations of the Identity Security Platform Shared Services - two new market-leading products.

Identity Security Trends, Priorities & Product Innovations Part 1 | CyberArk

What are today’s biggest trends in Identity Security and which security investments should your organization prioritize? CyberArk General Manager, Chen Bitan, answers these questions and more. Chen also introduced a new market-leading products in the areas of Cloud Privilege Security and Secrets Management. Following this, CyberArk Chief Product Officer, Peretz Regev, and CyberArk Vice Presidents of Product Management Karen Eldor and Yair Sade, shared demonstrations of the Identity Security Platform Shared Services - two new market-leading products.".

CyberArk Year in Review | Identity Security Investment & Innovation

As the threat landscape evolves, CyberArk has continuously tackled new initiatives to help keep organizations secured. Watch as CyberArk Co-Founder and CEO Udi Mokady, gives an overview of the company’s recent investments and innovations. You’ll also get a peek into CyberArk’s newest products designed to reduce cyber risk and boost efficiency.

How Cybersecurity Trends Drive Organizational Changes | Industry Panel Discussion

Ransomware threats, the many flavors of trust, and the war for talent, are just a few of the cybersecurity trends challenging (and changing) today’s organizations. Watch as CyberArk’s Regional Manager, Amit Grinman, as he speaks with Shay Nahmany, Director of IT at Israel National Digital Agency, Shelly Brownshtein, Head Of Cyber Security At Menora Mivtachim Insurance, and Yossi Marmarali, Director, Security Engineering & Business Information Security Officer at Netafim and Dura-Line (Orbia), about staying secure and addressing these concerns head-on.

Identity Security Trends, Priorities & Product Innovations Part 4 | CyberArk

What are today’s biggest trends in Identity Security and which security investments should your organization prioritize? CyberArk General Manager, Chen Bitan, answers these questions and more. Chen also introduced a new market-leading products in the areas of Cloud Privilege Security and Secrets Management. Following this, CyberArk Chief Product Officer, Peretz Regev, and CyberArk Vice Presidents of Product Management Karen Eldor and Yair Sade, shared demonstrations of the Identity Security Platform Shared Services - two new market-leading products.

Privilege Cloud Security | What's New and Best Practices

As part of our effort to improve the onboarding process, CyberArk has enhanced provisioning and management for personal privileged accounts. This leads to saving time and ensuring consistency when creating privileged accounts. Watch this session to learn about CyberArk Privilege Cloud, including the new, simplified personal admin account creation experience for our customers. We’ll also share some best practices for deploying Privilege Cloud, implementing multifactor authentication (MFA), telemetry, and more.

EP 19 - The Cybersecurity Gridiron

In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company’s nearly 40,000 employees cyber-trained and secure.

EP 18 - Why Protecting Critical Infrastructure is Critical in 2023

We’re starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we’re seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries.

Getting Ready for NIS2 - Why Identity Security is Key to Preparing for Compliance Updates

In January 2023, EU member states formally enacted a revision of the 2016 Network and Information Systems (NIS) Directive. Conceived in response to several widely publicized and damaging cyberattacks, the NIS2 Directive strengthens security requirements, streamlines reporting obligations and introduces more stringent supervisory measures and stricter enforcement requirements. This paper provides a brief introduction to NIS2 and explains how it might affect your business and how you can prepare.

Securing Non-human Identities and Managing Secrets in Multi-cloud Environments

Cloud migration and digital transformation have led to an explosion of non-human identities that need to be secured across multiple cloud and hybrid environments. And more identities mean more secrets that need to be secured, rotated and managed. That's where SaaS-based secrets management can help. In this eBook, you'll learn about: Want to learn more about SaaS-based secrets management? Schedule a meeting to speak to one of our experts today!