Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security

One Identity, a trusted leader in identity security, today announces a major upgrade to One Identity Manager, a top-rated IGA solution, strengthening identity governance as a critical security control for modern enterprise environments. One Identity Manager 10.0 introduces security-driven capabilities for risk-based governance, identity threat detection and response (ITDR), and AI-assisted insight, helping organizations better anticipate, contain, and manage identity-driven attacks across their complex IT ecosystems.

CyberArk named overall leader in 2025 KuppingerCole ITDR Leadership Compass

KuppingerCole has recognized CyberArk identity threat detection and response (ITDR) as a leader across all categories: overall, product, innovation, and market in its 2025 KuppingerCole Leadership Compass for Identity Threat Detection & Response.

How the future of privilege is reshaping compliance

If privilege has changed, compliance can’t stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet—especially when it comes to how privileged access is controlled and proven. Regulatory requirements are multiplying, audit cycles are tightening, and the definition of privileged access has quietly expanded beyond people to workloads, automation, and AI-driven systems.

Top 10 Privileged Access Management (PAM) Tools in 2026

For accounts that possess the utmost sensitive information and critical systems, managing who gets access to what is vital. This is where PAM tools play an important role. Privileged Access Management is a lucrative branch of IAM designed to monitor, record, and protect critical resources for accounts. However, have you thought about the repercussions of choosing the wrong PAM?

What is Secrets Management: An Essential Guide to Securing Credentials in Modern DevOps

We are surrounded by generative AI tools, cloud-based solutions, and AI assistants that often perform functions for us. We tend to share data with them for smoother operations and to automate our work for enhanced productivity. The non-human tools are a playground for cybercriminals to access the data and damage critical infrastructures. So, it is paramount for us, especially organizations, to protect the shared information, along with the access rights of the non-human entities.

Elevating Access Reviews to Be a Business Enabler

Is your organization treating access reviews as a checkbox exercise — or a business enabler? In the full video, CyberArk’s Deepak Taneja explains why access reviews are becoming a critical pillar of identity security and zero trust — and how automation is reshaping their value across the business. Watch the full interview to learn why a compliance-only mindset creates risk, how organizations are modernizing access reviews, and what it takes to shift from audit task to strategic advantage.

Protecting Your Identity and Information in Online Gaming

The video game sector is the largest entertainment industry in the world, and it is not particularly close. In fact, gaming generates more revenue (over $200 billion annually) than music, television, and film combined. Millions of gamers worldwide are playing, streaming, or consuming video game content at any given moment. With such a massive industry, much of it occurring online, the potential for security breaches is significant. Many titles involve online multiplayer modes or require external servers to operate. This means players must set up accounts to access the content they want.

What's shaping the AI agent security market in 2026

For the past two years, AI agents have dominated boardroom conversations, product roadmaps, and investor decks. Companies made bold promises, tested early prototypes, and poured resources into innovation, with analysts projecting an economic impact of $2.6 trillion to $4.4 trillion. As 2026 begins, the experimentation phase ends and the production era starts as organizations roll out AI agents at scale across their enterprises.

UNO reverse card: stealing cookies from cookie stealers

Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. In the case of StealC, the thin line between attacker and victim turned out to be highly exploitable. StealC is an infostealer malware that has been circulating since early 2023, sold under a Malware-as-a-Service (MaaS) model and marketed to threat actors seeking to steal cookies, passwords, and other sensitive data from infected computers.