Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Securing the Web Browser in an Identity-focused Threat Landscape

For more than 30 years, we’ve been living in a world where one of the most widely-used applications is the web browser. Despite being designed primarily for consumer use, browsers have become essential to how enterprises operate – serving as the connective tissue between identities, applications and data. And yet, despite all of the advancements leading to today’s digital and cloud-centric world, one of the least secure applications is … the browser.

Harnessing Biometrics and Face Recognition for Robust Security in Complex Organizational Systems

Biometrics revolutionizes the authentication landscape by leveraging unique biological characteristics, such as fingerprints, iris patterns, and facial features. Unlike traditional methods, biometrics provides a highly reliable and secure means of identity verification. Among these modalities, face recognition emerges as a convenient and non-intrusive approach that ensures robust security while enhancing user experience.

EP 30 - Securing Data Amid the AI Gold Rush

Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating.

Maximizing Security: How Biometric Integration Supports Large Banks and Organizations

In an era of increasingly sophisticated cyber threats and identity fraud, ensuring robust security measures has become paramount for large banks and organizations. As traditional authentication methods prove vulnerable, biometric integration emerges as a game-changing solution.

PAM Automation Scripts: Don't Forget to Secure Admin Credentials

While IT executives understand the essential role privileged access management (PAM) solutions play in their organization’s overall security strategy, they’ve also continued to ask their PAM administrators to do more with less resources. To meet these additional asks, PAM admins have automated routine PAM tasks using scripts. PAM automation scripts can significantly lessen the burden on PAM admins and enable organizations to scale PAM usage across their entire enterprise.

The Importance of Visibility | CYBR Pride

We are so proud to share CYBR Pride Employee Resource Group members Luke Thomas, Ani King and Fayssal Chenna as they discuss the importance of visibility and what it means for the LGBTQIA+ community. Listen to them talk about the power of representation and how we can all contribute to creating a safe space for everyone.

The future of security is identity and with CyberArk, the future of identity is secure

The future of security is identity, and with CyberArk, the future of identity is secure. Learn how CyberArk helps secure your organization against identity-based cyberattacks, with intelligent privilege controls for all identities – human and machine.

IoT has an identity problem. Here's how to solve it

Successfully Identifying operating systems in organizations has become a crucial part of network security and asset management products. With this information, IT and security departments can gain greater visibility and control over their network. When a software agent is installed on a host, this task becomes trivial. However, several OS types, mainly for embedded and IoT devices, are unmanaged or aren’t suitable to run an agent.