Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape

Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.

Enhancing Kubernetes Security: Strategies for Effective Secrets Management

Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised credentials, resulting in significant financial losses. The recent attack involving a stolen API key at the U.S. Treasury Department highlights the vulnerability of even well-protected systems.

EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape

Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.

Lurking Threats in Post-Authentication Sessions

An attacker doesn’t need your password anymore. They don’t even need to break your MFA. They just need to get ahold of your session. And once they have it, they are you. Organizations have focused on securing access for two decades, initially relying on passwords. When passwords proved weak and insufficient, multi-factor authentication (MFA) emerged as the new standard. It was a substantial improvement, adding an extra layer of security to verify users.

How CISOs Can Use Identity to Advance Zero Trust

AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about mutating polymorphic malware, prolonged ransomware sneak attacks that lead to double-extortion and deepfakes that defraud victims every few minutes.

CyberArk Secure Cloud Access Free Trial: Platform Interface Guide | CyberArk

New to CyberArk Secure Cloud Access? In this walkthrough, we’ll guide you through the platform interface, helping you navigate key features during your free trial. What you'll learn: Overview of the Secure Cloud Access platform How to manage cloud access securely Essential tools & settings for AWS integration.

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Unmanaged Endpoints: Your Security Blind Spot

It’s Monday morning and the coffee shop is full of telecommuters, sipping lattes and catching up on emails. The way organizations enable work has changed. With the rise of SaaS applications and cloud-first strategies, employees, contractors and third parties frequently access corporate assets from personal, unmanaged laptops.

The Rise of AI Agents-Collaborative Intelligence

2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These digital counterparts extend human intelligence, redefine workflows and create a new frontier in automation, cybersecurity and decision-making.

CyberArk Secure Cloud Access Free Trial - Step-by-Step Guide | CyberArk

Confused on how to get started with your CyberArk Secure Cloud Access free trial? No worries. We’ve created a video that walks you through the key steps to set up and explore CyberArk’s zero standing privilege access for multi-cloud environments. Secure your sensitive cloud resources while ensuring compliance with least privilege access.

Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure

Cryptojacking malware—a type of malware that tries to steal cryptocurrencies from users on infected machines. Curiously, this kind of malware isn’t nearly as famous as ransomware or even infostealer malware. We found this kind of strange since cryptocurrencies have been a popular subject in recent years, so you would think that malware that dabbles in the field would make some more headlines.

Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like “Password123,” “qwerty” or another easily forgotten combination—and those same passwords are frequently used between personal and corporate accounts. And even when we try to be smart about it, they are still the easiest way for hackers to get in.

Take Advantage of CyberArk Community Perks for Identity Security Success

The power of collaboration is limitless. In the CyberArk Community, a thriving group of professionals, customers, and partners join forces to solve challenges, share insights, and innovate in the realm of Identity Security. If you’re looking to level up your Identity Security strategy, the CyberArk Community is the ideal place to be. Our members come together to exchange knowledge, troubleshoot issues, and stay updated with the latest in CyberArk products and Identity Security practices.