Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CyberArk

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation - Part 1

Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of the processes were privileged, the communication between them is of particular interest, which led me to explore further. I found the processes were using named pipes for communication, and one of them was a way to forward API calls from a low-privileged user to a privileged service.

How to Secure Secrets in Multi-cloud Environments

It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining competitive. Most organizations have multiple cloud environments deployed, in addition to private cloud and on-premises environments. In fact, in a soon-to-release CyberArk survey, 85% of respondents said they would be using three or more cloud service providers by 2023.

EP 20 - Hacking ChatGPT

Even if you’ve been living under a super-sized rock for the last few months, you’ve probably heard of ChatGPT. It’s an AI-powered chatbot and it’s impressive. It’s performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental.

Securing The Enterprise's Cloud Assets on Amazon Web Services (AWS)

Regardless of where enterprises are in their cloud journey, CyberArk's goal is to enable enterprises to protect their assets in AWS by providing powerful solutions for securing privileged access at each stage of their journey. Download this white paper to learn how CyberArk Identity Security solutions can be deployed with CyberArk's automation capabilities and used to proactively protect privileged access and detect threats in real-time in AWS environments.

Privileged Access Management as a Service For Dummies

A quick read for actionable tips, technical insight and best practices. Privileged access represents one of the largest security vulnerabilities in today's digital landscape. Privileged accounts, credentials and secrets are everywhere throughout your IT infrastructure: on-premises, across multi-cloud and hybrid environments, in applications, on endpoints and in DevOps pipeline. Most security breaches involve a stolen privileged credential. That's why Privileged Access Management (PAM) is a critical part of any cyber security program.

Quanta Services Protects Privilege In Over 200 Subsidiaries | CyberArk

Quanta is a specialized contracting services company that delivers comprehensive infrastructure solutions for the utility, renewable energy, communications, pipeline, and energy industries. Founded in 1997 when four companies merged, Quanta has grown to become a $12 billion organization. See how CyberArk helped them enhance their security and reduce demand on IT teams.

Healthfirst Applies An Identity Security First Approach To Implement Zero Trust | CyberArk

Healthfirst’s unique advantage is to put members first by partnering closely on shared goals with its broad network of providers. Healthfirst is also a pioneer of the value-based care model, where hospitals and physicians are paid based on patient outcomes. See how CyberArk helped them reduce security costs with solutions like federated identity control.

Brazilian Judiciary Partners With CyberArk To Implement Intelligent Privilege Controls | CyberArk

Unpredictable, complex and urgent cybersecurity threats remain the principal concern for businesses from the largest enterprises to the newest start-ups. In Brazil, an effort to update and streamline the justice system demanded a fresh look at security, and identity management. See how CyberArk helped them reduce the area off attack of for their endpoints.

Turkcell Protects Millions Of Customers With CyberArk| CyberArk

Emre Tanrıverdioğlu has a daunting task. As the Identity and Management Operations Manager at Turkcell, he is charged with to protecting 40 million customers across Turkey, Ukraine, Belarus and Northern Cyprus. In addition, he needs to safeguard 300,000 network devices and 40,000 employee and partner identities. See how CyberArk helped them reduce the area off attack of for their endpoints.

Highlights From Impact Israel 2022

CyberArk Impact Israel 2022 brought Israel's cybersecurity industry together to hear from identity security experts at CyberArk and other industry leaders. Our audience obtained essential knowledge about CyberArk and emerging trends in identity security, which included the latest technologies and best practices to protect their organization from cyberattacks.