Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

C4 Bomb: Blowing Up Chrome's AppBound Cookie Encryption

In July 2024, Google introduced a new feature to better protect cookies in Chrome: AppBound Cookie Encryption. This new feature was able to disrupt the world of infostealers, forcing the malware developers to quickly modify their malware to adapt to the latest protections. In the new era of cookie protection, infostealer malware either need direct access to the Chrome process or to run with elevated privileges.

How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab

The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how far we’re willing to let them go. The frontier lies in tackling the chaos and solving the fragmented processes that slow enterprises: siloed rulebooks, scattered pricing spreadsheets, and manual approvals.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation. Listeners will learn.

EP 10 - A new identity crisis: governance in the AI age

In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.

Machine identity mayhem: The volume, variety, velocity challenge

Machine identities—like the API keys, certificates, and access tokens that secure machine-to-machine connections—are swarming businesses. Yet, many teams still reach for manual tools while their systems overclock. At the start of the year, I predicted the ratio of machine to human identities would likely soon tip past 100:1. As of mid-year, most organizations are clocking in at more than 80:1—and I’ve seen environments as high as 500:1.

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.

Now on AWS Marketplace: CyberArk Enterprise Support for cert-manager

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS and mTLS certificate automation in Kubernetes clusters. Today, we’re excited to announce that CyberArk Enterprise Support for cert-manager is now available through AWS Marketplace, giving EKS customers a direct path to operational reliability, compliance, and expert support at scale.

How to Lock Android Devices in Single App (One App) Mode?

This blog walks you through everything about Single App Mode—from what it is, why it matters, to how you can set it up in just a few steps using the miniOrange MDM solution. Whether you are managing a business device, a kiosk, or a learning tablet, we will show you how to take full control with ease.