Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure Cloud Access - CyberArk MCP Server

Take control of cloud access for AI-driven workflows without slowing down your team. CyberArk SCA MCP Server is the latest innovation in identity security, purpose-built for the age of agentic AI. Now available in the AWS Marketplace, CyberArk SCA MCP Server empowers developers and AI agents to securely request elevated access directly from their IDE while enforcing Zero Standing Privileges across multi-cloud environments.

How to Hack a Cloud: Insider Threat

In this episode of How to Hack a Cloud: Insider Threat, discover how standing administrative access in AWS can be exploited by a disgruntled employee. Follow Michael Scott’s story as he misuses his S3 admin privileges to silently delete critical data, leaving the company blindsided. Learn how CyberArk Secure Cloud Access enforces Zero Standing Privileges, ensuring time-bound, need-based access to prevent such malicious activity—all while maintaining seamless workflows for legitimate tasks. See how this solution strengthens identity security across multi-cloud environments.

How to Hack a Cloud Access Mismanagement

Protect Your Cloud: Prevent Access Mismanagement with CyberArk Secure Cloud Access Discover how to safeguard your cloud environment from access mismanagement in this eye-opening episode of How to Hack a Cloud: Access Mismanagement. The video demonstrates how attackers exploit standing AWS IAM access keys, turning a common oversight into a major security breach.

The Two AI Licenses You Need to Know

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

See Falcon Next-Gen Identity Security in Action

Traditional identity and access management (IAM) and privileged access management (PAM) solutions are unprepared to face modern identity attacks. These solutions are primarily built to manage access — not secure it. Falcon Next-Gen Identity Security combines proactive prevention, modern secure privileged access, identity threat detection and response (ITDR), SaaS identity security, and agentic identity protection to stop identity-driven attacks.

What is Phishing?

What exactly is phishing—and how can you avoid falling for it? In this video, we break down phishing attacks in plain terms, from classic email scams to newer tactics like smishing, vishing, and even quishing (yes, phishing via QR code!). You’ll learn how to spot the warning signs, understand the real-world consequences of falling for a phishing attempt, and discover simple yet powerful ways to protect yourself and your organization.

Episode 3: Exploring ManageEngine PAM's certificate lifecycle management capabilities

In the third installment of the PAM Masterclass training series, we'll focus on mastering certificate lifecycle management. This session will guide you through best practices for deploying, renewing, and monitoring certificates to help you build a secure, well-maintained IT environment.