Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Securing Remote Access: Best Practices for Third-Party Risk Management

The physical location of users has become less and less important in conducting business, with the drawback that it creates new, persistent threats to organizations. You know that. You may not know that remote access to IT and business-critical systems is not a new concept. It’s been around since the late 1980s.

CIO POV: How Modern CIOs Wear (at Least) Seven Different Hats

When the title of chief information officer (CIO) first emerged in the early 1980s, it was very different from what it is today. Technology evolution, emerging threats and new realities have shifted the role from simply “keeping the lights on” to strategically “enabling the business” in every way.

EP 66 - Post-Election Insights: AI, Misinformation and Security

In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S.

How CyberArk Scaled SaaS Transformation: Insights from SVP Corporate Finance Nili Serr-Reuven

Discover how CyberArk's transformation into a SaaS company reshaped its business and finance operations. SVP Nili Serr-Reuven shares insights on scaling a SaaS delivery model, the critical role of finance in transformation, and lessons learned along the way. Tune in for expert advice on driving growth and innovation in the SaaS space.

How to Detect Identity Breaches (Before It's Too Late)

The faster an identity breach is detected, the faster an organization can take steps to reduce the impact of the data breach. Faster detection times and notifications to impacted staff and organizations can result in lower data breach recovery costs and help save a company’s reputation.