Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-10-13 20:12:35 |
8 Ways to “Fight the Phish” this Cybersecurity Awareness Month (lien direct) |
We've all been targeted in phishing attacks - fake messages from a seemingly trusted or reputable source designed to convince you to click on a malicious link, reveal information, give unauthorized access to a system... |
|
|
|
|
2021-10-07 13:00:40 |
Hybrid Work Brings DaaS and Endpoint Risks (lien direct) |
It happened so gradually that we almost didn't notice it. The initial rush to establish remote work systems was fueled by frantic desperation and necessity. Businesses that never even considered having a remote workforce were... |
|
|
|
|
2021-10-04 12:56:43 |
Rethinking Passwords this Cybersecurity Awareness Month (lien direct) |
A new month is upon us, which means two things. First, your 30-day password may have just expired, and you'll need to come up with a new one so you can get back on your... |
|
|
|
|
2021-09-30 13:00:08 |
RPA: How to Securely Start and Scale in the Automation-First Era (lien direct) |
Robotic Process Automation (RPA) is one of the key technologies fueling digital transformation. Ranked by industry experts as one of the fastest-growing enterprise software categories, RPA is helping businesses and their employees achieve the efficiency,... |
|
|
|
|
2021-09-24 13:00:01 |
Data Breach Costs and Cloud Security Implications: 2021 (lien direct) |
A hybrid cloud makes a lot of sense for most modern businesses. By stacking all your IT “building blocks” - services and infrastructure hosted on-premises or in your private and public cloud environments - together... |
|
|
|
|
2021-09-22 14:34:54 |
Find CyberArk at these DevSecOps Fall 2021 Events (lien direct) |
Applications, as well as the tools and automated processes throughout the DevOps pipeline, are increasing targets for sophisticated digital supply chain attackers. But with the right tools and strategy in place, security teams can partner... |
|
|
|
|
2021-09-17 20:41:54 |
Don\'t Let Cybersecurity Cracks Become Major Breaches (lien direct) |
Many major cybersecurity breaches can be traced back to the tiniest flaw. But as zero-day exploitations continue to make headlines and new vulnerabilities enter the National Vulnerability Database (NVD) almost daily, it's often hard for... |
Vulnerability
|
|
|
|
2021-09-14 20:35:54 |
Cyber Insurance: How to Meet Requirements, Save Money and Reduce Risk (lien direct) |
As the average cost of a data breach reaches a record high of $4.24 million, one successful zero-day exploit or ransomware attack has the potential to take down a business completely. Having cyber insurance, or... |
Ransomware
Data Breach
|
|
|
|
2021-09-08 21:06:43 |
Ransomware Defense Best Practices (lien direct) |
Ransomware has never been more prevalent - or profitable - than it is right now. What started as the exclusive domain of highly skilled and opportunistic bad actors has evolved into an underground industry in... |
Ransomware
|
|
|
|
2021-09-02 17:50:02 |
The Cybersecurity Insider Threat “Among Us” (lien direct) |
Although created a few years before the world went into lockdown, something about the simple app-based game Among Us* truly tapped into the pandemic zeitgeist like nothing else. On the one hand, it was a... |
Threat
|
|
|
|
2021-08-31 13:00:08 |
A Lesson on Higher Education Cybersecurity Risks (lien direct) |
U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the largest enrollment decline seen in a decade, swirling controversy over reopening physical classrooms, outmoded IT infrastructure that's sagging under the pressure... |
|
|
|
|
2021-08-27 13:00:37 |
Ask These Questions Before Investing in Privileged Access Management (lien direct) |
Identity and privileged access security challenges aren't anything new - the pages of history are filled with tales of deception and fraud. During the Trojan War, the Greeks disguised their soldiers by putting them in... |
|
|
|
|
2021-08-24 12:35:48 |
CyberArk on AWS Marketplace: Driving Faster Time-to-Value for Customers and Partners (lien direct) |
Migrating workloads to the cloud is a top priority for many organizations, and businesses everywhere are using Amazon Web Services (AWS) to accelerate IT service agility, simplify operations and minimize capital equipment expense and complexity.... |
|
|
|
|
2021-08-20 13:00:27 |
How Collaborative Cybersecurity Is Disrupting Disruption (lien direct) |
Out of a period of severe, real-world disruption came disruption's polar opposite: cooperation. For a long time, cybersecurity seemed to be an area that needed to be shrouded in mystery. Don't let others know your... |
|
|
|
|
2021-08-18 13:00:56 |
Black Hat Reflections: Supply Chain Attacks, Zero Days and Disclosures (lien direct) |
Black Hat 2021 had a markedly different tone from previous years. Welcoming remarks explored the strong parallels between cybersecurity and COVID-19 prevention, with founder Jeff Moss asking “…what are you doing to try to confer... |
|
|
|
|
2021-08-13 13:00:54 |
Critical Infrastructure Cybersecurity Gets its Invisible Spotlight (lien direct) |
While the federal government cannot command private industry, it can provide direction and drive urgency. To this end, the Biden Administration recently issued a new National Security Memorandum (NSM) outlining steps to safeguard the country's... |
|
|
|
|
2021-08-10 18:00:15 |
Living Off the Land Ransomware Attacks: A Step-By-Step Plan for Playing Defense (lien direct) |
It's been a staple of horror movies and espionage thrillers for years - the idea that something innocuous or trusted could suddenly turn against you. Unfortunately, what's fodder for great fiction can also easily become... |
Ransomware
|
|
|
|
2021-08-04 13:00:12 |
Introducing the CyberTalk with CyberArk Podcast Series: On-the-Go Cybersecurity Insights (lien direct) |
Ninety-one percent of cybersecurity practitioners agree they must keep up with their skills, or the organizations they work for are at a significant disadvantage against today's cyber adversaries, according to a new Information Systems Security... |
|
|
|
|
2021-07-30 13:00:50 |
Ransomware Protection, a Gold-Medal Team Approach (lien direct) |
If the cybersecurity industry was to adopt a motto, the Summer Games' 2021 “Faster, Higher, Stronger - Together” adaptation should serve as inspiration. As high-profile ransomware attacks continue unabated, the need for a collaborative and... |
Ransomware
|
|
|
|
2021-07-26 13:00:25 |
Stopping Cyber Threats with Unstoppable Innovation (lien direct) |
Several powerful and unforeseen market forces are driving the need for new, innovative approaches to combat evolving cyber threats. Central to achieving this critical mission is securing privileged access - the common thread woven across... |
|
|
|
|
2021-07-23 13:00:41 |
Reduce Cloud Compliance Risk with Least Privilege (lien direct) |
Meeting regulatory compliance requirements is one of global organizations' top challenges as they scale cloud deployments and embrace multi-cloud strategies to drive business efficiencies. The burgeoning number of identities within public cloud environments is a... |
|
|
|
|
2021-07-16 13:00:24 |
4 Risk-Based Steps for Securing Developers and Code (lien direct) |
As software supply chain attacks surge in frequency and scale, it's become apparent that cyber criminals are looking for stealthy ways to make malicious changes or inject malware into software - before it's deployed -... |
Malware
|
|
|
|
2021-07-13 13:00:27 |
Attackers Are After Privileged Users. Do You Know Who They Are? (lien direct) |
Attackers have more potential entry points into your organization than ever before. And many are brushing up on their acting skills, getting more creative and increasingly personal to spoof the most unsuspecting employees and launch... |
|
|
|
|
2021-07-07 13:00:59 |
In Kaseya Supply Chain Ransomware Attack History Repeats Itself (lien direct) |
While many Americans took off early to jump-start the Independence Day weekend, cyber attackers were launching the single biggest ransomware attack in history. It's estimated that at least 800 to 1,500 organizations - primarily managed... |
Ransomware
|
|
|
|
2021-07-01 13:00:31 |
The DevSecOps Mission: Get Security \'Right\' from the Start (lien direct) |
The SolarWinds attack, along with others that have torn across supply chains in alarming succession since, has been a shock to so many systems (literally and figuratively). But by spotlighting ubiquitous software vulnerabilities and insecure... |
|
|
|
|
2021-06-29 13:00:46 |
Ransomware Is Why Healthcare Endpoint Security Needs Urgent Care (lien direct) |
Throughout the pandemic, a wave of ransomware attacks disrupted operations in healthcare organizations around the world. As frontline workers fought to keep patients alive, many documented records by hand and struggled to deliver effective care... |
Ransomware
|
|
|
|
2021-06-25 13:00:04 |
Cryptomining Cloud Attack: Compromise Sensitive Console Access (lien direct) |
Remember how the Ocean's Eleven crew couldn't just attack one casino… they had to go for three? Well, the same goes for some cyber criminals who think, “Why stop at data theft when I can... |
|
APT 32
|
|
|
2021-06-22 13:00:02 |
Preparing for the 5G Revolution Starts with Understanding Identity Security Threats (lien direct) |
The fifth generation of wireless technology - 5G for short - promises to redefine the network, as well as digital experiences as we know them. But with any rapid tech advancement, there's also the certainty... |
|
|
|
|
2021-06-15 17:33:50 |
How Federal Agencies Can Secure Secrets in Automation Environments at Scale (lien direct) |
IT modernization in the federal government sector is more than just plugging in new technology. It's about changing the way government workers operate to be more efficient, effective, and transparent - all while bolstering cybersecurity... |
|
|
|
|
2021-06-10 16:46:53 |
Impact Live 2021: Security Teams Gain Application Security Mandate (lien direct) |
Cybersecurity teams are starting to play a much larger role in application security as organizations look to implement a more systematic approach to securing software supply chains on an end-to-end basis. During its virtual CyberArk... |
|
|
|
|
2021-06-09 19:20:27 |
Impact Live 2021: Advancing Zero Trust IT with PAM and IAM (lien direct) |
During its virtual CyberArk Impact Live 2021 conference this week, the company showcased a broad portfolio of security solutions that are central to any Zero Trust approach to securing an IT environment based on identity.... |
|
|
|
|
2021-06-09 13:00:29 |
Least Privilege in The Cloud (and Everywhere Else) (lien direct) |
Mark Twain once wrote that “History never repeats itself, but it often rhymes.” This is especially true in the world of cybersecurity. By examining some of the major breaches over the past decade, a repetitive... |
|
|
|
|
2021-06-08 19:00:41 |
Live from Impact 2021: Shaping the Future of Identity Security (lien direct) |
In the spirit of looking forward with renewed confidence and optimism, thousands of cybersecurity professionals joined us today to kick off CyberArk Impact Live 2021, the world's largest virtual gathering focused on Identity Security. Our... |
|
|
|
|
2021-06-03 13:53:17 |
Why Cybersecurity Executive Order Takes Big Steps Toward Marshaling US Cyber Defenses (lien direct) |
Sometimes, it takes a significant event - a “forcing function” - to catalyze significant change. It can even take more than one. A series of cyber attacks with real-world implications and far-reaching impact recently culminated... |
|
|
|
|
2021-06-01 13:00:29 |
How to Communicate the Identity Security Imperative to Your Board (lien direct) |
Despite numerous business-level issues jockeying for space on the board agenda, there isn't an executive team on the planet that isn't talking about cybersecurity today. The SolarWinds breach, unrelenting ransomware attacks and evolving digital threats... |
Ransomware
|
|
|
|
2021-05-27 13:51:08 |
RSA 2021: How CISOs Can Build Cyber Resilience for the Road Ahead (lien direct) |
From captivating keynotes to impromptu coffee line chats to networking party hopping, there's nothing like being together with thousands of industry peers for the RSA Conference. But while we missed the annual trek to San... |
|
|
|
|
2021-05-25 13:00:35 |
Hack(er)-of-All-Trades: Q&A with CyberArk Technical Evangelist Andy Thompson (lien direct) |
We can't help it. We hear the word “hacker” and our minds instantly go to shadowy figures in dark rooms frantically causing as much malicious digital mayhem as they can. It's a misconception that bothers... |
|
|
|
|
2021-05-18 13:00:48 |
Breaking Down the Business Benefits and Cost Savings of CyberArk Privileged Access Management as a Service (lien direct) |
By now, most organizations understand the importance of Privileged Access Management (PAM) in reducing risk and protecting critical assets from inevitable cyber attacks. But what may be less obvious are the operational efficiencies and positive... |
|
|
|
|
2021-05-12 13:00:12 |
Opportunistic vs. Targeted Ransomware Attacks (lien direct) |
The critical infrastructure systems we rely on to deliver water, electricity, fuel and other essential services are under siege. Increasingly, ransomware is becoming cyber criminals' attack method of choice, for they understand that even short... |
Ransomware
|
|
|