Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CIO POV: Five Essential Themes Shaping the CIO's Tech Agenda

Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are shiny and hyped, while others are familiar and fundamental yet equally important. Here’s a look at five on the top of my list.

BDRSuite vs Proxmox Backup Server: Which Backup Solution is Right for You?

When it comes to protecting your Proxmox virtualized environments, selecting the right backup solution is crucial for ensuring data integrity, minimizing downtime, and optimizing recovery efforts. BDRSuite’s Proxmox Backup and Proxmox Backup Server (PBS) both offer reliable Proxmox backup solutions, but each has its unique features and advantages tailored to different needs.

Data Gathering in Cybersecurity: Techniques, Best Practices, and Key Questions

In cybersecurity, the ability to gather, analyze, and act on data determines how well an organization can anticipate threats, detect vulnerabilities, and respond to attacks. But not all intelligence is created equal. Knowing what data to collect, where to find it, and how to interpret it is what separates reactive security teams from proactive ones.

Understanding Identity Threat Detection and Response

One of the largest data breaches of 2024 didn’t require advanced tactics, techniques, and procedures (TTPs), or an escalating chain of successful attacks. It simply required purchasing credentials on the dark web and using them to log in and steal data, once again highlighting the vital need for robust, proactive protection against the growing surge of identity-based attacks.

Dialer Service: Boost Efficiency with Automated Customer Outreach

If you've worked in customer service, sales, or any role where you reach out to people, you've probably thought: "There's gotta be a faster way to do this." Enter dialer services. These tools can save you time, reduce stress, and keep you from hurling your phone across the room.

Top Cyber Resilience Best Practices CISO's Need to Know

Want to strengthen your organisation’s ability to withstand and recover from a cyber attack? Given the inevitability of such threats in the digital business landscape, understanding the key elements to cyber resilience is crucial. In this article, we’ll discuss the practical steps to prepare, respond, and ensure continuous operations and ensure resilience to cyber threats.

The technical limitations of MDM vs device trust

This blog has been adapted from a section of 1Password’s ebook: “Why MDM isn’t enough for device security”. To read the complete ebook, click here. For years, mobile device management solutions (MDMs) have been all but ubiquitous in corporate cybersecurity. Devices enrolled in MDM are commonly referred to as “managed,” which reflects the tendency of companies to consider a device functionally secure as long as it has MDM installed.

Understanding the business benefits of PAM: Beyond IT security

In today's fast-paced digital environment, organizations face a growing need to protect sensitive systems and data while maintaining operational efficiency and driving productivity. One Identity Safeguard, a comprehensive Privileged Access Management (PAM) solution, not only addresses security concerns, but also offers significant business advantages that go beyond basic compliance and risk mitigation.

Compliant until breached: The case for Digital Identity

If organizations are complying with their regulatory obligations, why are they still being breached? This obvious question exposes a paradox at the heart of everything we do in cybersecurity. It seems that the more we regulate, the more compliance requirements and frameworks we produce, and the more we nurture cybersecurity awareness, the more cyber incidents we face. What’s going on? Where’s the cause and where’s the effect?