Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of AI Agents-Collaborative Intelligence

2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These digital counterparts extend human intelligence, redefine workflows and create a new frontier in automation, cybersecurity and decision-making.

Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure

Cryptojacking malware—a type of malware that tries to steal cryptocurrencies from users on infected machines. Curiously, this kind of malware isn’t nearly as famous as ransomware or even infostealer malware. We found this kind of strange since cryptocurrencies have been a popular subject in recent years, so you would think that malware that dabbles in the field would make some more headlines.

Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like “Password123,” “qwerty” or another easily forgotten combination—and those same passwords are frequently used between personal and corporate accounts. And even when we try to be smart about it, they are still the easiest way for hackers to get in.

Take Advantage of CyberArk Community Perks for Identity Security Success

The power of collaboration is limitless. In the CyberArk Community, a thriving group of professionals, customers, and partners join forces to solve challenges, share insights, and innovate in the realm of Identity Security. If you’re looking to level up your Identity Security strategy, the CyberArk Community is the ideal place to be. Our members come together to exchange knowledge, troubleshoot issues, and stay updated with the latest in CyberArk products and Identity Security practices.

What's On the Horizon for AI Risk Management

Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s a fascinating article that balances enthusiasm for AI’s potential with the very real warning signs flashing over all our heads.

The Agentic AI Revolution: 5 Unexpected Security Challenges

As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data. This blog post aims to shed light on these changes and the significant security challenges they bring. It’s important to note that given the rapid pace of advancements in this field, we could not have anticipated many of the challenges discussed here just a few months ago.

EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience

In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats.

Let's Be Authentik: You Can't Always Leak ORMs

Identity providers (IdPs) or Identity and Access Management (IAM) solutions are essential for implementing secure and efficient user authentication and authorization in every application. By centralizing user identity management, IdPs streamline the verification of user credentials and grant access to various resources. This post is the second part of our journey into open source IAMs.

CIO POV: Five Essential Themes Shaping the CIO's Tech Agenda

Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are shiny and hyped, while others are familiar and fundamental yet equally important. Here’s a look at five on the top of my list.

Deepfake Reality: My Experience as a Target

Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to a trusted boardroom expert. I take my role seriously because trust and credibility define success in this field. But I recently discovered that even with all my experience, I wasn’t immune to one of today’s fastest-growing threats—deepfake technology.