Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CyberArk Recognized as a Leader in 2024 Gartner Magic Quadrant for PAM

Today, we’re exceptionally proud to announce our recognition as a Leader in the “2024 Gartner Magic Quadrant for Privileged Access Management (PAM)”1 for the sixth time in a row. CyberArk was positioned furthest in Completeness of Vision.

EP 61 - Put Your Name on It: Identity Verification and Fighting Fraud

Aaron Painter, CEO of NameTag, joins host David Puner for a conversation that covers several key themes, including the inadequacies of current identity verification methods, the rise of deep fakes and AI-generated fraud – and the importance of preventing identity fraud rather than merely detecting it. Aaron discusses the role of advanced technologies like cryptography, biometrics and AI in improving identity verification.

7 Examples of How AI in Data Security is Transforming Cybersecurity

AI in data security transforms how organizations protect sensitive information. Companies turn to artificial intelligence for robust defense mechanisms as cyber threats evolve. This cutting-edge technology analyzes vast datasets, identifies patterns, and responds to threats in real-time, surpassing human capabilities. From small businesses to large enterprises, AI-powered solutions guard against increasingly sophisticated attacks.

Vanta continues AWS momentum with Security Competency achievement

Vanta has achieved the Amazon Web Services (AWS) Security Competency status. This designation recognizes that Vanta excels at providing deep AWS technical expertise and integrations that help customers achieve their cloud security and compliance goals. ‍ Over half of Vanta’s 8,000+ customers leverage AWS. Achieving the AWS Security Competency reinforces our continual commitment to delivering deeply automated, integrated product experiences.

Who Can See My Internet Search and Browsing History?

Your internet search and browsing history can be seen by search engines, web browsers, websites, apps and hackers. You should protect your search and browsing history to keep your sensitive information, including your login credentials and financial data, safe from hackers. Continue reading to learn more about search and browsing history, who can see it and how you can keep it private.

Was Your SSN Found on the Dark Web? Here's What To Do.

You may be concerned if your Social Security number (SSN) was found on the dark web following the recent breach that, according to CNBC, exposed almost three billion SSNs. National Public Data, a company that conducts background checks, suffered a data breach involving SSNs, email addresses, phone numbers and home addresses. If your SSN was found on the dark web, you are most likely concerned about your identity being stolen.

Virtual CISO Services: A Smart Solution for Modern Businesses

In today's dynamic cybersecurity landscape, businesses of all sizes face significant challenges in safeguarding their data and systems from cyber threats. As the need for robust cybersecurity measures grows, many organizations are turning to Virtual CISO (vCISO) services as a cost-effective and flexible solution to enhance their security posture. A Virtual CISO is an outsourced cybersecurity professional or team that provides the expertise and guidance of a Chief Information Security Officer (CISO) on a part-time or contract basis.