Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

The Drawing Board | Privileged Access Management

CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

CyberArk Identity 23.11 Release

CyberArk MFA now supports authentication with phishing-resistant passkeys and qualifies for the highest NIST Authenticator Assurance Level (AAL3). Based on FIDO2 standards, passkeys replace passwords and provide faster, easier and more secure sign-ins to websites and apps across user devices. With this release, end users can authenticate using passkeys to access their applications and resources.

Identity Security's Crucial Role in Safeguarding Data Privacy

More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s because if an attacker compromises a single identity in an organization where sensitive data is collected, stored and handled, it’s all downhill from there.

Building Secure and Compliant SaaS Apps - Identity Security Best Practices

Do you need to secure high-risk access to the back end of your customer-facing apps? Yes, you do – assuming you care about cybersecurity risk, uptime or compliance with SOC II and NIST and AWS, Azure and GCP architecture frameworks. To meet compliance requirements and grow your business, you must properly secure access to the cloud services and workloads powering your SaaS app.

EP 39 - Analyzing the MGM and Okta Breaches: the Identity Connection

In this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs’ Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta’s support unit.

Understanding the 3 Key Stages of Money Laundering 2023

Money laundering is a pervasive and complex issue, with criminals going to great lengths to legitimize the proceeds from their illicit activities. They aim to obscure the origins of “dirty money” and reintroduce it into the economy through legitimate means, eluding law enforcement authorities. This process comprises three crucial Money Laundering Stages: Placement, Layering, and Integration.

Skeleton Keys and Local Admin Passwords: A Cautionary Tale

Picture yourself immersed in your favorite mystery novel, eagerly flipping through the pages as the suspense thickens. You’re enthralled, engrossed in the story of a hotel burglar with an uncanny ability to sneak into guest rooms without leaving telltale signs of break-ins or lock-picking. As you read on, you’re captivated – and stumped – by how this elusive bad actor can deftly close the doors behind them, leaving no clues.