PRODUCTS

July 2019

CyberArk Docs: Privileged Access Security Documentation for All

Not long ago on the CyberArk Conjur blog, our DevOps community manager and evangelist John Walsh explored the history and evolution of open source software. It’s a great read that highlights the clear relationship between open source adoption and DevOps success in the enterprise, along with the power of community engagement and information sharing. We’ve […]

CyberArk Docs: Privileged Access Security Documentation for All Read More »

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud

For years, security was cited as a prime reason not to put sensitive data or valuable workloads into the public cloud. It’s safe to say that situation has changed. In fact, the CyberArk Global Advanced Threat Landscape Report 2019: Focus on Cloud found that the vast majority (94 percent) of the 1,000 global organizations surveyed

CyberArk. Where Security Accountability Stops and Starts in the Public Cloud Read More »

CyberArk. Privileged Access Key to China’s Attack on Telecoms

The recent attack by China on Cellular companies – called Operation Soft Cell – is part of an espionage campaign that leverages privileged access in privileged accounts. Compromising credentials remains the weapon of choice for attackers and a top attack pattern. We first encountered this pattern when Edward Snowden revealed Operation Socialist, a CIA and

CyberArk. Privileged Access Key to China’s Attack on Telecoms Read More »

Sophos. 7 best practices for securing the public cloud

Given the simplicity and cost-effectiveness of the public cloud, it’s no surprise that more and more organizations are turning to Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You can spin up a new instance in minutes, scale resources up and down whenever you need while only paying for what you use,

Sophos. 7 best practices for securing the public cloud Read More »

How Intercept X Advanced can help you avoid becoming a ransomware victim

Tourists aren’t the only ones looking at Florida this summer. As the Sunshine State ramps up to greet a flock of vacationers, it’s also facing some far less welcome visitors. Over the last few weeks, cybercriminals have targeted Florida with advanced ransomware attacks requesting heavy payments in return for restoring data. In one example, the

How Intercept X Advanced can help you avoid becoming a ransomware victim Read More »