CyberArk
Follow
492 Followers
Follow CyberArk on their other social channels!
About Us
Founded:
1999
Company Size:
501-1000 employees
Company Type:
Public
Location:
60 Wells Avenue Newton, MA 02459 United States
Website:
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against c ...
Read more
Promoted Content
THE CISO VIEW | Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials
Follow
Don't miss our webinar tomorrow - Securing Privilege on the Endpoint. Please join us 11am EST, copy this link to your browser: http://lp.cyberark.com/20170228-Forrester-Webinar_Registration-Landing-Page.html
Follow
RSA Conference 2017: Privileged Account Security across the Enterprise
With record-breaking attendance and a jam-packed agenda of thought-provoking keynotes, technical sessions, tutorials and seminars, this year’s RSA Conference was not one to miss. Everywhere you turned, there was something new to learn and see—from debating about how artificial intelligence and machine learning could shape the industry’s future, to meeting young startups approaching security challenges in interesting new ways, to participating in lively technical discussions wit ...
Follow
Spot Insider Threats: 10 Commands Commonly Used During the Cyber Attack Cycle
Today, CyberArk announced a new capability that helps organizations automatically detect insider threats and accelerate incident response times. With this integrated release of CyberArk Privileged Threat Analytics and CyberArk Privileged Session Manager, customers can now receive customizable, prioritized alerts on high-risk user activity – during privileged sessions – to help security teams swiftly investigate and disrupt potential insider attacks. Throughout the course of this rele ...
Follow
Don’t Analyze Everything – Analyze the Right Thing to Detect and Respond to Insider Threats
In 2013, organizations worldwide started to take insider threats seriously, thanks to a man named Edward Snowden. Yet, his is just one of many cases of authorized insiders who have caused damage – both intentionally and accidentally – to the organizations that trusted them.  From the Sage Group incident in the UK to the case of Harold Martin to, most recently, the IT admin who allegedly held a university’s email system hostage in exchange for $200,000, insider threats are ...
Follow
When Innocent Mistakes Turn Into Costly Problems
When most people hear about an “insider threat,” they often assume it’s a malicious employee who is either out to prove a point or trying to selfishly make a buck. Yet, as one startup learned last week, the real “insider threat” is often a well-intentioned person who, in the course of simply trying to do his or her job, accidentally causes something to go wrong. Human error is a prevalent cause of accidents, which means IT and security teams should prepare according ...
Follow
The Value of Experience: Leveraging Peer-to-Peer Guidance
There is a story of a man trapped in a deep hole, shouting for help. A second man passing by hears the calls and jumps into the hole with him. “Why did you do that?” the first man asks. “Now we’re both down here!” “Yes,” the second man replies, “but I’ve been here before, and I know the way out.” If you feel like you’re in over your head trying to implement cyber security and incident response programs for your organization, you a ...
Follow
Noteworthy Cyber Security Statistics
Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog. With the launch of a new year, it’s a good time to be mindful of the lessons learned in 2016. The cyber security industry is chock-full of reports and surveys that continually provide new insights and stats. Privilege is the road most traveled in advanced attacks – that remains a constant. The sophisti ...
Follow
Misinformation and the Loss of Public Trust
Misinformation—and the misuse of information—came to the fore of public attention during the 2016 U.S. presidential election. Exactly who was behind the well-publicized hackings, leaks and fake news stories, and their impact, remains under investigation and might not be known for months, if ever. However, what is clear is that the ability to use misinformation for political gain or otherwise will continue to be a significant cyber security issue in 2017 and beyond. In fact, concerns ...
Follow
CyberArk Privileged Account Security Includes Integrations with IT Ticket Management
Need a new software program installed on your laptop? Call the help desk.  Can’t get the VPN to work? Call the help desk. Spilled water on your computer? Call the help desk. Depending on the size of the organization, an IT help desk can receive dozens, hundreds or even thousands of requests daily, so it’s no surprise that IT teams rely on ticket management solutions to address the workload, track cases and collaborate on tricky problems. Ingrained within the IT department of man ...
Follow
Technology Spotlight Examines the Impact of Securing Privileged Credentials on the Endpoint
A new Technology Spotlight from independent analyst firm IDC highlights steps for securing privileged credentials as part of a proactive approach to hardening the endpoint against cyber attacks. Security and desktop operations teams will gain insight into the foundational elements of a comprehensive cyber security strategy to reduce the attack surface that includes endpoint protection. The Technology Spotlight, “Key Considerations for Securing Privilege on the Endpoint,”1 is sponsore ...
Follow
138
Fundamental Endpoint Security Best Practice: Securing Privilege on the Endpoint
Information security professionals know there are two fundamental endpoint security practices that should be part of their security program in order to reduce the attack surface. Validated by various government information security organizations and industry analysts, the first practice is application patching, and it has been widely adopted thanks to commonly available enabling tools. The second is securing privilege on the endpoint. Read the full blog at: http://www.cyberark.com/blog/funda ...
Follow
130
Cybersecurity Risks via SSH Key Management on Unix/Linux
Unix and Linux systems often run sensitive databases, corporate websites and business critical applications, but too often, organizations don’t know exactly who or what has access to these critical systems. When you add SSH keys into the mix, the situation gets even worse. SSH keys provide privileged – and often full root – access to Unix and Linux systems, and if you’re not taking steps to secure and manage these sensitive credentials, you’re leaving holes that can easily be exploi ...
Follow
92
CyberArk Labs Research: Analyzing Ransomware and Potential Mitigation Strategies
As part of an ongoing investigation, the CyberArk Labs team has tested more than 157,000 pieces of real-world ransomware to learn more about how it works and to identify alternative methods for mitigating the threat. As a result, they have identified a common prevention denominator across all tested ransomware instances to-date. This revelation, along with actionable recommendations for combatting ransomware attacks, can be found in the published report: “Analyzing Ransomware and Potential Mit ...
Follow
93
Securing Third-Party Remote Access, A Weak Link in Enterprise IT
As organizations work to secure their networks, they often overlook remote access security controls, which can help to secure third-party access to privileged accounts. As a result, organizations are left with a very weak link in security, one that is all too often exploited by attackers to gain powerful access to the network. In fact, recent high-profile attacks reveal that malicious hackers are increasingly targeting third-party vendors and supply chain partners. Research shows that 63 perc ...
Follow
117
Cyber attacks start at your endpoints – don’t let them advance
CyberArk Endpoint Privilege Manager secures privileges on the endpoint and contains attacks early in their lifecycle. It enables revocation of local administrator rights, while minimizing impact on user productivity, by seamlessly elevating privileges for authorized applications or tasks. Application control, with automatic policy creation, allows organizations to prevent malicious applications from executing and runs unknown applications in a restricted mode. This, combined with credential thef ...
Follow
100
Application Credentials: The Hidden Attack Pathway into Your Organization
Today, it’s well-understood that credentials belonging to IT administrators, business users, partners and others with high levels of network access are critical for gaining unauthorized access to key systems, and ultimately, the heart of the enterprise. As we’ve explored previously, too many organizations continue to equate privileged credentials with IT administrators alone. The reality is that privileged access is not limited to users with a “heart beat.”   Every day, countl ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Watering Hole Attack
Views: 235 / February 27, 2017
Ethical Hacking – Kali Linux 2.0 Tutorials
Views: 515 / February 27, 2017
Raw Log Anatomy: Understanding my SIEM System
Views: 2566 / February 26, 2017
Kali Linux – Hacking OS Tutorial Series
Views: 4914 / February 25, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel