Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.

Identity security: The essential foundation for every CISO's 2026 cybersecurity strategy

When I first joined CyberArk, it wasn’t just about the company or the technology, but a belief. A belief that identity security is the foundation of cybersecurity. Identity security is the unifying thread that ties together risk management, resilience, and trust in an era where identity—human, AI, and machine—has become the true perimeter of the enterprise. Every day, I see how this conviction plays out across industries and organizations.

EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.

How to Set Up Google Drive Integration in monday.com | Connect Google Drive with monday.com

This tutorial demonstrates how to set up the Google Drive Integration for monday.com, enabling seamless access to your Google Drive files directly within monday.com. With this app, you can view, search, and manage your Drive files without leaving your monday.com workspace. Experience smooth 2-way synchronization between Google Drive and monday.com for better collaboration and file management. With the monday.com Google Drive Integration, you can.

5 fraud and identity experts on 2025-2026 trends

As with previous years, we asked identity and fraud experts to reflect on the closing year and share a few predictions for the next. You’ll get unique perspectives from fraud fighters, researchers, and an executive. We asked them about unexpected fraud trends, which tactics will become more valuable, leadership’s changing perceptions, and AI, of course. But we kicked things off with a lighthearted question.

In the Digital Era, Security Starts with Identity

A few years ago, an IP address was enough to identify users online ‒ almost like a physical address that indicated where they were located. Today, however, users no longer rely on a single device or location, making it far more difficult for organizations to recognize who is accessing their systems, from where, and with what level of risk.
Featured Post

Identity at the Core: How Oil and Gas Cybersecurity is Entering a New Era

For many years, cybersecurity conversations in the oil and gas sector have centered on familiar themes, including the divide between IT and OT, the limitations of legacy tooling, the growing pressure of regulation, and the long-standing question of how to modernize an industry built on infrastructure measured in decades rather than release cycles. But these discussions are changing, becoming more grounded in operational reality as the industry's appetite for convergence between identity, cloud, and OT grows stronger than at any point in recent memory.

Hydden partners with CyberArk to deliver enhanced identity visibility

In today’s threat landscape, the identity attack surface is expanding at an unprecedented rate. Recent high-profile breaches have demonstrated how cybercriminals exploit any type of identity or account to gain an initial foothold within the corporate environment. Organizations with hybrid, multi-cloud infrastructures or those navigating mergers, acquisitions, and broader digital business transformations are especially vulnerable to misconfigured identity systems and poor identity hygiene.

The future of AI in Identity Security, with Martin Kuppinger and One Identity CEO Praerit Garg

Join One Identity CEO Praerit Garg and KuppingerCole Founder and Principal Analyst Martin Kuppinger as they discuss the evolution of IAM and thefuture of AI in Identity Security.

Secret Management: A Step-by-step Guide to NHI Security

It’s not hard for secrets to sprawl, buried under layers of commits and forgotten branches. Most teams don’t notice it until one bad push exposes everything. Secret leaks don’t come from breaches, but from configuration drift and forgotten credentials; a gap that traditional vault tools struggle to close on their own. Here’s the scale of that mess. Machine identities now outnumber human users by more than 80 to 1, and each one relies on credentials to function.