Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Discovering Hidden Vulnerabilities in Portainer with CodeQL

Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly web interface to deploy and monitor containerized applications easily. Since Portainer is an open-source, we thought CodeQL, an advanced code analysis tool, be a good fit to check its codebase for any security issues.

Building Trust in Digital Retail: How Identity Security Protects E-Commerce

As retailers prepare for a season of high-demand online shopping, the risks of cyberthreats continue to grow, much like the need for increased security in a bustling mall on busy shopping days. In today’s retail landscape, identity security serves as the “mall security team” of the digital world—working behind the scenes to protect customer trust and to help ensure seamless, secure shopping experiences.

New Discovery Service Boosts Security and Efficiency for IT Admins in the CyberArk Identity Security Platform

The new discovery service, delivered by the CyberArk Identity Security Platform, introduces new capabilities and streamlines the scanning of environments containing *nix, Windows and MacOS target machines. The new service offers SaaS-based flexible scans, local accounts discovery based on endpoint agents, data collection and enhanced automation using Discovery rules.

How to Protect Your IoT and OT Devices from Cyberthreats

The rise of the Internet of Things (IoT) and Operational Technology (OT) devices is reshaping industries, accelerating innovation and driving new efficiencies. However, as organizations increasingly depend on these devices, the security challenges associated with them are mounting. Traditional security measures often fall short in protecting these critical assets from cyberthreats, leaving organizations vulnerable to potentially severe disruptions.

EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker

In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk’s resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len’s singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security.

CIO POV: Building Trust in Cyberspace

Trust lies at the heart of every relationship, transaction and encounter. Yet in cyberspace—where we work, live, learn and play—trust can become elusive. Since the dawn of the Internet nearly 50 years ago, we’ve witnessed incredible digital transformations paired with increasingly formidable threats. Knowing who and what to trust has become so difficult that the very notion of trust has been flipped on its head.

Intelligent Privilege Controls: A Quick Guide to Secure Every Identity

Security used to be simpler. Employees, servers and applications were on site. IT admins were the only privileged identities you had to secure, and a strong security perimeter helped to keep all the bad guys out. Times have changed. Attackers targeting identities is not new. What’s different is the dramatic increase in the quantities and types of identities, attacks and environments.