www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-21T06:18:39+00:00 www.secnews.physaphae.fr CyberArk - Software Vendor La menace croissante des cyberattaques liées à l'identité: aperçu du paysage des menaces<br>The Growing Threat of Identity-Related Cyberattacks: Insights Into the Threat Landscape The last 12 months have witnessed a rapid-fire round of innovation and adoption of new technologies. Powerful new identities, environments and attack methods are shaping the quickly changing cybersecurity threat landscape, rendering it more complex...]]> 2024-05-16T17:33:48+00:00 https://www.cyberark.com/blog/the-growing-threat-of-identity-related-cyberattacks-insights-into-the-threat-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=8501094 False Threat None 2.0000000000000000 CyberArk - Software Vendor Défense en profondeur pour la gestion des secrets: découverte, visibilité, détection des fuites et IA<br>Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI In the past, many security teams considered securing secrets enough – if your secrets were secured, you were good. While you\'re still kind-of-good staying on this course, security professionals increasingly recognize that just securing secrets...]]> 2024-04-23T13:10:53+00:00 https://www.cyberark.com/blog/defense-in-depth-for-secrets-management-discovery-visibility-leak-detection-and-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8487413 False None None 3.0000000000000000 CyberArk - Software Vendor Cookies au-delà des navigateurs: comment évoluer les attaques basées sur la session<br>Cookies Beyond Browsers: How Session-Based Attacks Are Evolving In the past few years, we have witnessed a significant shift in the attack landscape, from stealing clear text credentials to targeting session-based authentication. This trend is driven by the proliferation of multi-factor authentication (MFA),...]]> 2024-04-09T15:05:01+00:00 https://www.cyberark.com/blog/cookies-beyond-browsers-how-session-based-attacks-are-evolving/ www.secnews.physaphae.fr/article.php?IdArticle=8478738 False Prediction None 2.0000000000000000 CyberArk - Software Vendor Quelle est la sécurisation de l'identité numérique automobile?<br>How Secure is Automotive Digital Identity? In the automotive industry’s fast lane, the fusion of digital innovation with vehicular engineering has revolutionized how we manufacture, drive and protect our vehicles. It also helps to ensure our cars are safeguarded against cyber...]]> 2024-04-02T19:52:00+00:00 https://www.cyberark.com/blog/how-secure-is-automotive-digital-identity/ www.secnews.physaphae.fr/article.php?IdArticle=8474796 False None None 3.0000000000000000 CyberArk - Software Vendor Sécurité électorale: défendre la démocratie dans le paysage dynamique du cyber-menace d'aujourd'hui<br>Election Security: Defending Democracy in Today\\'s Dynamic Cyber Threat Landscape With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters...]]> 2024-03-28T14:30:22+00:00 https://www.cyberark.com/blog/election-security-defending-democracy-in-todays-dynamic-cyber-threat-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=8472067 False Threat None 3.0000000000000000 CyberArk - Software Vendor CIO POV: Ce qui fait un bon voisin dans un mauvais quartier de cyber<br>CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood “It\'s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle This quote from the late American horror film director has recently been running through my head as I think of...]]> 2024-03-21T12:53:37+00:00 https://www.cyberark.com/blog/cio-pov-what-makes-a-good-neighbor-in-a-bad-cyber-neighborhood/ www.secnews.physaphae.fr/article.php?IdArticle=8467884 False None None 2.0000000000000000 CyberArk - Software Vendor Pourquoi votre organisation a besoin de secrets et de rotations dynamiques<br>Why Your Organization Needs Dynamic Secrets and Rotation In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace transformative technologies such as AI, automation, cloud-native architectures, microservices and...]]> 2024-03-05T15:57:40+00:00 https://www.cyberark.com/blog/why-your-organization-needs-dynamic-secrets-and-rotation/ www.secnews.physaphae.fr/article.php?IdArticle=8459377 False None None 2.0000000000000000 CyberArk - Software Vendor Browser en entreprise: la passerelle vers la sécurisation de toutes les identités<br>Enterprise Browser: The Gateway to Securing All Identities With new identities, environments and attack methods dominating today\'s threat landscape, cybersecurity leaders are hyper-focused on securing identities to safeguard enterprises. However, a glaring, high-touch security gap exists that threat actors actively exploit to steal...]]> 2024-02-21T14:37:16+00:00 https://www.cyberark.com/blog/enterprise-browser-the-gateway-to-securing-all-identities/ www.secnews.physaphae.fr/article.php?IdArticle=8453228 False Threat None 2.0000000000000000 CyberArk - Software Vendor CIO POV: 3 considérations comme le cyber-roller coaster 2024 rassemble la vitesse<br>CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than the...]]> 2024-02-15T14:44:46+00:00 https://www.cyberark.com/blog/cio-pov-3-considerations-as-the-2024-cyber-roller-coaster-gathers-speed/ www.secnews.physaphae.fr/article.php?IdArticle=8450436 False None None 2.0000000000000000 CyberArk - Software Vendor Attaque d'APT29 \\ sur Microsoft: suivi des empreintes de pas Cozy Bear \\<br>APT29\\'s Attack on Microsoft: Tracking Cozy Bear\\'s Footprints A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely to come. These recent...]]> 2024-02-08T14:51:00+00:00 https://www.cyberark.com/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints/ www.secnews.physaphae.fr/article.php?IdArticle=8448041 False Threat APT 29 3.0000000000000000 CyberArk - Software Vendor Comment répondre aux exigences de cyber-assurance lorsque toutes les identités sont à risque<br>How to Meet Cyber Insurance Requirements When All Identities Are at Risk The growing frequency and sophistication of cyberattacks, especially on the ransomware front, have compelled even more companies to seek cyber insurance coverage. But as the need for coverage grows, so do the complexities. Even though...]]> 2023-12-07T20:55:31+00:00 https://www.cyberark.com/blog/how-to-meet-cyber-insurance-requirements-when-all-identities-are-at-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8419999 False Ransomware None 2.0000000000000000 CyberArk - Software Vendor Assembler l'attaque de l'unité de support d'Okta \\<br>Piecing Together the Attack on Okta\\'s Support Unit The October 2023 Okta breach is the latest example in a long line of third-party identity attacks. Based on reports to date, it seems that the attack on Okta\'s support case management system enabled a...]]> 2023-10-24T22:01:56+00:00 https://www.cyberark.com/blog/piecing-together-the-attack-on-oktas-support-unit/ www.secnews.physaphae.fr/article.php?IdArticle=8399892 False None None 2.0000000000000000 CyberArk - Software Vendor Nos cœurs sont brisés, mais nous prévaudrons<br>Our Hearts Are Broken, But We Will Prevail We are horrified by the barbaric attack on Israel and the Israeli people. Those of us who are watching from a distance are standing in solidarity with our friends, loved ones and colleagues who are...]]> 2023-10-13T12:51:52+00:00 https://www.cyberark.com/blog/our-hearts-are-broken-but-we-will-prevail/ www.secnews.physaphae.fr/article.php?IdArticle=8395119 False None None 3.0000000000000000 CyberArk - Software Vendor Les meilleures pratiques de macOS pour lutter contre l'augmentation des ransomwares<br>macOS Least Privilege Best Practices to Combat Rising Ransomware Ransomware accounts for one in every four breaches, and increasingly, it\'s going after enterprise macOS users. macOS Ransomware Attacks are Mounting Historically, it didn\'t make much financial sense for attackers to create Mac-specific malware since...]]> 2023-06-27T19:36:41+00:00 https://www.cyberark.com/blog/macos-least-privilege-best-practices-to-combat-rising-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8349866 False Ransomware,Malware None 2.0000000000000000 CyberArk - Software Vendor Les six principaux risques de sécurité de l'identité aggravant la cyber dette et élargissant la surface d'attaque<br>Top Six Identity Security Risks Compounding Cyber Debt and Expanding the Attack Surface The prolonged period of low-capital costs and widely available funding may be over, yet digital adoption persists as business leaders seek to unlock efficiencies and innovation everywhere. This is driving exponential but often unsecure identity...]]> 2023-06-13T12:31:05+00:00 https://www.cyberark.com/blog/top-six-identity-security-risks-compounding-cyber-debt-and-expanding-the-attack-surface/ www.secnews.physaphae.fr/article.php?IdArticle=8344788 False Studies,Guideline None 3.0000000000000000 CyberArk - Software Vendor Analyse de 3 scénarios d'attaque d'IA offensive<br>Analyzing 3 Offensive AI Attack Scenarios Artificial intelligence (AI) is transforming modern society at unprecedented speed. It can do your homework, help you make better investment decisions, turn your selfie into a Renaissance painting or write code on your behalf. While...]]> 2023-06-08T07:10:02+00:00 https://www.cyberark.com/blog/analyzing-3-offensive-ai-attack-scenarios/ www.secnews.physaphae.fr/article.php?IdArticle=8343358 False None None 2.0000000000000000 CyberArk - Software Vendor Cyber Breach Retmediation \\'s 5 étapes du cycle<br>Cyber Breach Remediation\\'s 5-Step Cycle Organizations tend to fall into two categories: those that have been breached and those that don\'t yet realize they\'ve been breached. If you belong to the first group, believe it or not, you\'re in luck....]]> 2023-06-01T06:38:13+00:00 https://www.cyberark.com/blog/cyber-breach-remediations-5-step-cycle/ www.secnews.physaphae.fr/article.php?IdArticle=8341258 False None None 3.0000000000000000 CyberArk - Software Vendor LTT Attack cible les cookies de session pour pousser l'escroquerie cryptographique [LTT Attack Targets Session Cookies to Push Crypto Scam] Crypto scams are skyrocketing: In 2022, the FBI tracked an 183% year-over-year increase, driving $2.57 billion in losses. Last week, the popular YouTube channel Linus Tech Tips (LTT for short) – and two associated channels...]]> 2023-03-27T08:12:45+00:00 https://www.cyberark.com/blog/ltt-attack-targets-session-cookies-to-push-crypto-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8322094 False None None 3.0000000000000000 CyberArk - Software Vendor Protect Passwords, Don\'t Just Manage Them: A Game Plan for CIOs and CISOs 2023-03-17T18:37:32+00:00 https://www.cyberark.com/blog/protect-passwords-dont-just-manage-them-a-game-plan-for-cios-and-cisos/ www.secnews.physaphae.fr/article.php?IdArticle=8319474 False None None 3.0000000000000000 CyberArk - Software Vendor Post-CircleCI Breach, Focus on Identity Security Strategy 2023-02-07T22:27:22+00:00 https://www.cyberark.com/blog/post-circleci-breach-focus-on-identity-security-strategy/ www.secnews.physaphae.fr/article.php?IdArticle=8308057 False None None 3.0000000000000000 CyberArk - Software Vendor Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit 2023-01-19T20:24:53+00:00 https://www.cyberark.com/blog/zero-days-in-rgb-keyboards-top-did-network-exposed-at-intent-threat-research-summit/ www.secnews.physaphae.fr/article.php?IdArticle=8302664 False Data Breach,Threat None 3.0000000000000000 CyberArk - Software Vendor CircleCI Breach Exposes Risk of Hard-coded Secrets 2023-01-13T21:03:50+00:00 https://www.cyberark.com/blog/circleci-breach-exposes-risk-of-hard-coded-secrets/ www.secnews.physaphae.fr/article.php?IdArticle=8301001 False None None 3.0000000000000000 CyberArk - Software Vendor Six Takeaways from Recent Ransomware Attacks 2023-01-11T17:00:50+00:00 https://www.cyberark.com/blog/six-takeaways-from-recent-ransomware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8300258 False Ransomware,Threat None 2.0000000000000000 CyberArk - Software Vendor CyberArk Labs\' 2022 Threat Research in Review 2023-01-03T14:00:25+00:00 https://www.cyberark.com/blog/cyberark-labs-2022-threat-research-in-review/ www.secnews.physaphae.fr/article.php?IdArticle=8297471 False Threat None 3.0000000000000000 CyberArk - Software Vendor Trust Issues Podcast: A 2022 Cyber Episodes Replay 2022-12-29T14:00:37+00:00 https://www.cyberark.com/blog/trust-issues-podcast/ www.secnews.physaphae.fr/article.php?IdArticle=8295796 False Threat None 2.0000000000000000 CyberArk - Software Vendor 2023 Cybersecurity Trends We\'re Tracking 2022-12-16T14:00:35+00:00 https://www.cyberark.com/blog/2023-cybersecurity-trends-were-tracking/ www.secnews.physaphae.fr/article.php?IdArticle=8292010 False Prediction None 3.0000000000000000 CyberArk - Software Vendor Latest Uber Breach Underscores Third-Party Vendor Security Challenges 2022-12-15T14:00:27+00:00 https://www.cyberark.com/blog/latest-uber-breach-underscores-third-party-vendor-security-challenges/ www.secnews.physaphae.fr/article.php?IdArticle=8291592 False None Uber,Uber 2.0000000000000000 CyberArk - Software Vendor Meet PCI DSS and Protect Cardholder Data with PAM Controls 2022-11-23T14:00:17+00:00 https://www.cyberark.com/blog/meet-pci-dss-and-protect-cardholder-data-with-pam-controls/ www.secnews.physaphae.fr/article.php?IdArticle=8180866 False None None None CyberArk - Software Vendor 2023 Cyber Insurance Looks Different. Are You Ready? 2022-10-21T13:00:20+00:00 https://www.cyberark.com/blog/2023-cyber-insurance-looks-different-are-you-ready/ www.secnews.physaphae.fr/article.php?IdArticle=7607248 False Ransomware None None CyberArk - Software Vendor This Cybersecurity Awareness Month, Set Your Identity Security Strategy to Master Cyber Fundamentals 2022-10-03T13:00:57+00:00 https://www.cyberark.com/blog/this-cybersecurity-awareness-month-set-your-identity-security-strategy-to-master-cyber-fundamentals/ www.secnews.physaphae.fr/article.php?IdArticle=7288018 False None None None CyberArk - Software Vendor Unpacking the Uber Breach 2022-09-20T20:06:38+00:00 https://www.cyberark.com/blog/unpacking-the-uber-breach/ www.secnews.physaphae.fr/article.php?IdArticle=7023330 False None Uber,Uber None CyberArk - Software Vendor LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me” 2022-08-23T13:00:43+00:00 https://www.cyberark.com/blog/lockbit-3-0-ransomware-learns-from-defenders-launches-bug-bounty-program-begs-hack-me/ www.secnews.physaphae.fr/article.php?IdArticle=6485013 False Ransomware None None CyberArk - Software Vendor CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction 2022-08-10T12:50:43+00:00 https://www.cyberark.com/blog/cyberark-acquires-c3m-accelerating-cloud-privilege-security-and-cyber-risk-reduction/ www.secnews.physaphae.fr/article.php?IdArticle=6229511 False None None None CyberArk - Software Vendor 6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director 2022-08-05T13:00:51+00:00 https://www.cyberark.com/blog/6-identity-security-soundbites-from-david-higgins-cyberark-emea-technical-director/ www.secnews.physaphae.fr/article.php?IdArticle=6144333 False None None None CyberArk - Software Vendor Cyber Attack Commoditization and the Rise of Access-as-a-Service 2022-07-12T13:00:13+00:00 https://www.cyberark.com/blog/cyber-attack-commoditization-and-the-rise-of-access-as-a-service/ www.secnews.physaphae.fr/article.php?IdArticle=5669844 False None None None CyberArk - Software Vendor Australia\'s Growing Focus on Critical Infrastructure Cybersecurity 2022-06-29T12:47:21+00:00 https://www.cyberark.com/blog/australias-growing-focus-on-critical-infrastructure-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=5451052 False Ransomware None None CyberArk - Software Vendor Trust, Patient Empowerment and Data: Insights From Takeda\'s Chief Digital Trust Officer 2022-06-24T13:00:38+00:00 https://www.cyberark.com/blog/trust-patient-empowerment-and-data-insights-from-takedas-chief-digital-trust-officer/ www.secnews.physaphae.fr/article.php?IdArticle=5364244 False None None None CyberArk - Software Vendor What\'s Missing in Healthcare Ransomware and Supply Chain Defense 2022-06-22T13:00:50+00:00 https://www.cyberark.com/blog/whats-missing-in-healthcare-ransomware-and-supply-chain-defense/ www.secnews.physaphae.fr/article.php?IdArticle=5330848 False Ransomware,Threat None None CyberArk - Software Vendor RSA 2022, Wi-Fi Cracking Across San Francisco and How It All Comes Down to Trust 2022-06-17T13:00:25+00:00 https://www.cyberark.com/blog/rsa-2022-wi-fi-cracking-across-san-francisco-and-how-it-all-comes-down-to-trust/ www.secnews.physaphae.fr/article.php?IdArticle=5222945 False None None None CyberArk - Software Vendor Celebrating Our LGBTQIA2S++ Community With Pride 2022-06-10T15:58:31+00:00 https://www.cyberark.com/blog/celebrating-our-lgbtqia2s-community-with-pride/ www.secnews.physaphae.fr/article.php?IdArticle=5077180 False None None None CyberArk - Software Vendor What the 2022 NBA Finals Teaches Us About All-Star Cybersecurity 2022-06-07T13:00:07+00:00 https://www.cyberark.com/blog/what-the-2022-nba-finals-teaches-us-about-all-star-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=5026315 False Threat None None CyberArk - Software Vendor Step Away From the QR Code and Read These 7 Safety Tips 2022-06-02T10:00:00+00:00 https://www.cyberark.com/blog/step-away-from-the-qr-code-and-read-these-7-safety-tips/ www.secnews.physaphae.fr/article.php?IdArticle=4930671 False None None None CyberArk - Software Vendor 2022 Verizon DBIR: 15 Years, 15 Takeaways 2022-06-01T13:00:45+00:00 https://www.cyberark.com/blog/2022-verizon-dbir-15-years-15-takeaways/ www.secnews.physaphae.fr/article.php?IdArticle=4922966 False Data Breach,Threat None None CyberArk - Software Vendor RPA and the Speed vs. Security Balancing Act 2022-05-24T13:00:40+00:00 https://www.cyberark.com/blog/rpa-and-the-speed-vs-security-balancing-act/ www.secnews.physaphae.fr/article.php?IdArticle=4786125 False None None None CyberArk - Software Vendor 6 Best Practices for Securing Employee Workstations Everywhere 2022-05-19T13:00:45+00:00 https://www.cyberark.com/blog/6-best-practices-for-securing-employee-workstations-everywhere/ www.secnews.physaphae.fr/article.php?IdArticle=4707602 False None None None CyberArk - Software Vendor CyberArk Ventures: Bringing Security-First Innovators Together to Amplify Impact 2022-05-12T10:45:04+00:00 https://www.cyberark.com/blog/cyberark-ventures-bringing-security-first-innovators-together-to-amplify-impact/ www.secnews.physaphae.fr/article.php?IdArticle=4593600 False None None None CyberArk - Software Vendor 4 Extraordinary Women in Identity Security Named to CRN\'s 2022 Women of the Channel List 2022-05-10T13:19:14+00:00 https://www.cyberark.com/blog/4-extraordinary-women-in-identity-security-named-to-crns-2022-women-of-the-channel-list/ www.secnews.physaphae.fr/article.php?IdArticle=4593601 False Guideline None None CyberArk - Software Vendor CISOs Are Having a Moment. Here\'s How to Make It Last 2022-05-06T16:49:00+00:00 https://www.cyberark.com/blog/cisos-are-having-a-moment-heres-how-to-make-it-last/ www.secnews.physaphae.fr/article.php?IdArticle=4593602 False None None None CyberArk - Software Vendor You\'ve Got Privileged Access Management… But Can You Keep Secrets Secure? 2022-05-03T13:00:33+00:00 https://www.cyberark.com/blog/youve-got-privileged-access-management-but-can-you-keep-secrets-secure/ www.secnews.physaphae.fr/article.php?IdArticle=4593603 False Threat None None CyberArk - Software Vendor CyberArk SaaS Solutions Now In-Process for FedRAMP High Authorization 2022-04-27T15:30:51+00:00 https://www.cyberark.com/blog/cyberark-saas-solutions-now-in-process-for-fedramp-high-authorization/ www.secnews.physaphae.fr/article.php?IdArticle=4593604 False None None None CyberArk - Software Vendor Secrets Management to Protect the Software Supply Chain: A Q&A with IDC\'s Jim Mercer 2022-04-26T11:14:27+00:00 https://www.cyberark.com/blog/secrets-management-to-protect-the-software-supply-chain-a-qa-with-idcs-jim-mercer/ www.secnews.physaphae.fr/article.php?IdArticle=4593605 False None None None CyberArk - Software Vendor 4 Ways to Strengthen Your Identity Provider with Defense in Depth 2022-04-20T13:00:29+00:00 https://www.cyberark.com/blog/4-ways-to-strengthen-your-identity-provider-with-defense-in-depth/ www.secnews.physaphae.fr/article.php?IdArticle=4593606 False None None None CyberArk - Software Vendor Kids Talk Cybersecurity, Online Habits and Growing Up in the Digital World 2022-04-14T13:00:42+00:00 https://www.cyberark.com/blog/kids-talk-cybersecurity-online-habits-and-growing-up-in-the-digital-world/ www.secnews.physaphae.fr/article.php?IdArticle=4593607 False None None None CyberArk - Software Vendor How Digital Identities Drive Cybersecurity Debt, the Hidden Transformation Trade-Off 2022-04-12T10:00:53+00:00 https://www.cyberark.com/blog/how-digital-identities-drive-cybersecurity-debt-the-hidden-transformation-trade-off/ www.secnews.physaphae.fr/article.php?IdArticle=4593608 False Guideline None None CyberArk - Software Vendor 4 Reasons to “Enroll” at CyberArk University 2022-04-08T13:00:59+00:00 https://www.cyberark.com/blog/4-reasons-to-enroll-at-cyberark-university/ www.secnews.physaphae.fr/article.php?IdArticle=4593609 False None None None CyberArk - Software Vendor Why SOC 2 Compliance Is a Matter of (Zero) Trust 2022-04-07T11:57:37+00:00 https://www.cyberark.com/blog/why-soc-2-compliance-is-a-matter-of-zero-trust/ www.secnews.physaphae.fr/article.php?IdArticle=4593610 False None None None CyberArk - Software Vendor Identity Security Tips to Protect Your Turf 2022-03-31T13:00:34+00:00 https://www.cyberark.com/blog/identity-security-tips-to-protect-your-turf/ www.secnews.physaphae.fr/article.php?IdArticle=4593611 False None None None CyberArk - Software Vendor Women in Identity Security Spotlight: Erica Smith, CyberArk SVP of IR and ESG 2022-03-29T13:00:45+00:00 https://www.cyberark.com/blog/women-in-identity-security/ www.secnews.physaphae.fr/article.php?IdArticle=4593612 False None None None CyberArk - Software Vendor CyberArk\'s Perspective on the January 2022 Okta Compromise 2022-03-24T22:17:17+00:00 https://www.cyberark.com/blog/cyberarks-perspective-on-the-january-2022-okta-compromise/ www.secnews.physaphae.fr/article.php?IdArticle=4593613 False None None None CyberArk - Software Vendor Ransomware Rewind: From Floppy Disks to Ransomcloud Attacks 2022-03-18T13:00:10+00:00 https://www.cyberark.com/blog/ransomware-rewind-from-floppy-disks-to-ransomcloud-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=4593614 False Ransomware None None CyberArk - Software Vendor Endpoint Credential Theft: How to Block and Tackle at Scale 2022-03-11T14:00:43+00:00 https://www.cyberark.com/blog/endpoint-credential-theft-how-to-block-and-tackle-at-scale/ www.secnews.physaphae.fr/article.php?IdArticle=4593615 False Threat None None CyberArk - Software Vendor The Case for Building Identity Security into Enterprise UX Design 2022-03-08T14:00:30+00:00 https://www.cyberark.com/blog/the-case-for-building-identity-security-into-enterprise-ux-design/ www.secnews.physaphae.fr/article.php?IdArticle=4593616 False None None None CyberArk - Software Vendor What to Do with Your “Second Chance” at Identity Security Success 2022-03-03T14:00:59+00:00 https://www.cyberark.com/blog/what-to-do-with-your-second-chance-at-identity-security-success/ www.secnews.physaphae.fr/article.php?IdArticle=4593617 False None None None CyberArk - Software Vendor Mission: Cyber Resilience 2022-02-25T20:35:12+00:00 https://www.cyberark.com/blog/mission-cyber-resilience/ www.secnews.physaphae.fr/article.php?IdArticle=4593618 False Threat,Guideline None None CyberArk - Software Vendor HermeticWiper: What We Know About New Malware Targeting Ukrainian Infrastructure (Thus Far) 2022-02-24T23:05:45+00:00 https://www.cyberark.com/blog/hermeticwiper-what-we-know-about-new-malware-targeting-ukrainian-infrastructure-thus-far/ www.secnews.physaphae.fr/article.php?IdArticle=4593619 False Malware None None CyberArk - Software Vendor How to Fast-Track Your PAM Deployment for Rapid Risk Reduction 2022-02-23T14:00:06+00:00 https://www.cyberark.com/blog/how-to-fast-track-your-pam-deployment-for-rapid-risk-reduction/ www.secnews.physaphae.fr/article.php?IdArticle=4593620 False Ransomware None 4.0000000000000000 CyberArk - Software Vendor How Red Teams Challenge Thinking and Put Cyber Defenses to the Test 2022-02-10T14:00:20+00:00 https://www.cyberark.com/blog/how-red-teams-challenge-thinking-and-put-cyber-defenses-to-the-test/ www.secnews.physaphae.fr/article.php?IdArticle=4593621 False None None None CyberArk - Software Vendor Why User Session Visibility is Key for Secure Applications 2022-02-08T14:00:42+00:00 https://www.cyberark.com/blog/why-user-session-visibility-is-key-for-secure-applications/ www.secnews.physaphae.fr/article.php?IdArticle=4593622 False None None None CyberArk - Software Vendor Let the Cybersecurity (Winter) Games Begin 2022-02-03T14:00:53+00:00 https://www.cyberark.com/blog/let-the-cybersecurity-winter-games-begin/ www.secnews.physaphae.fr/article.php?IdArticle=4593623 False None None None CyberArk - Software Vendor Secure Third-Party Access to Protect Water Systems and Critical Operational Technology 2022-02-02T20:17:26+00:00 https://www.cyberark.com/blog/secure-third-party-access-to-protect-water-systems-and-critical-operational-technology/ www.secnews.physaphae.fr/article.php?IdArticle=4593624 False None None None CyberArk - Software Vendor Protect Your Personal Information this Data Privacy Day 2022-01-27T14:00:07+00:00 https://www.cyberark.com/blog/protect-your-personal-information-this-data-privacy-day/ www.secnews.physaphae.fr/article.php?IdArticle=4593625 False None None None CyberArk - Software Vendor CyberArk CHRO on Bridging the Cybersecurity Skills Gap 2022-01-25T14:00:41+00:00 https://www.cyberark.com/blog/cyberark-chro-on-bridging-the-cybersecurity-skills-gap/ www.secnews.physaphae.fr/article.php?IdArticle=4593626 False None None None CyberArk - Software Vendor CISA on Ukraine Cyber Attacks: Are You at Risk? 2022-01-19T14:00:35+00:00 https://www.cyberark.com/blog/cisa-on-ukraine-cyber-attacks-are-you-at-risk/ www.secnews.physaphae.fr/article.php?IdArticle=4593628 False None None 5.0000000000000000 CyberArk - Software Vendor 3 Kubernetes Risks and What to Do About Them 2022-01-11T17:00:50+00:00 https://www.cyberark.com/blog/3-kubernetes-risks-and-what-to-do-about-them/ www.secnews.physaphae.fr/article.php?IdArticle=4593629 False None Uber 4.0000000000000000 CyberArk - Software Vendor 3 Cyber Attacks that Didn\'t Get Enough Attention in 2021 (But Probably Should Have) 2022-01-07T14:00:27+00:00 https://www.cyberark.com/blog/3-cyber-attacks-that-didnt-get-enough-attention-in-2021-but-probably-should-have/ www.secnews.physaphae.fr/article.php?IdArticle=4593630 False None Wannacry 2.0000000000000000 CyberArk - Software Vendor Has SolarWinds Transformed Cybersecurity? 2022-01-05T17:00:32+00:00 https://www.cyberark.com/blog/has-solarwinds-transformed-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=4593631 False None None None CyberArk - Software Vendor Top Identity Security Blog Posts of 2021 2021-12-31T15:33:58+00:00 https://www.cyberark.com/blog/top-identity-security-blog-posts-of-2021/ www.secnews.physaphae.fr/article.php?IdArticle=4593632 False None None None CyberArk - Software Vendor 12 Cybersecurity Conversations Spanning Identity, Privilege and the Evolving Landscape 2021-12-28T13:30:27+00:00 https://www.cyberark.com/blog/12-cybersecurity-conversations-spanning-identity-privilege-and-the-evolving-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=4593633 False Ransomware None None CyberArk - Software Vendor Workforce Trends to Watch in 2022: What Attackers Want from Collaboration Apps 2021-12-23T16:21:40+00:00 https://www.cyberark.com/blog/workforce-trends-to-watch-in-2022-what-attackers-want-from-collaboration-apps/ www.secnews.physaphae.fr/article.php?IdArticle=4593634 False None None None CyberArk - Software Vendor When Threat Research Goes Wrong: Spectacular Screwups and What to Learn from Them 2021-12-21T20:13:20+00:00 https://www.cyberark.com/blog/when-threat-research-goes-wrong-spectacular-screwups-and-what-to-learn-from-them/ www.secnews.physaphae.fr/article.php?IdArticle=4593635 False Threat None None CyberArk - Software Vendor Log4j: What to Know. What to Do. And How to Stay Ahead 2021-12-16T23:34:19+00:00 https://www.cyberark.com/blog/log4j-what-to-know-what-to-do-and-how-to-stay-ahead/ www.secnews.physaphae.fr/article.php?IdArticle=4593636 False None None None CyberArk - Software Vendor CISO Spotlight: Highmark Health\'s Khawaja on Creating a Security-First Culture 2021-12-14T14:25:27+00:00 https://www.cyberark.com/blog/highmark-health-ciso-khawaja-security-first-culture/ www.secnews.physaphae.fr/article.php?IdArticle=4593637 False None None None CyberArk - Software Vendor Cloud Identity Security – Key Themes from AWS re:Invent 2021 2021-12-10T14:28:09+00:00 https://www.cyberark.com/blog/cloud-identity-security-key-themes-from-aws-reinvent-2021/ www.secnews.physaphae.fr/article.php?IdArticle=4593638 False None None None CyberArk - Software Vendor Simplify Identity Security with this How-to Guide (for Dummies) 2021-12-08T14:25:52+00:00 https://www.cyberark.com/blog/simplify-identity-security-with-this-how-to-guide-for-dummies/ www.secnews.physaphae.fr/article.php?IdArticle=4593639 False None None None CyberArk - Software Vendor Cybersecurity Trends for 2022: The Roots of Attacker Innovation 2021-12-03T13:58:44+00:00 https://www.cyberark.com/blog/cybersecurity-trends-for-2022-the-roots-of-attacker-innovation/ www.secnews.physaphae.fr/article.php?IdArticle=4593640 False None None None CyberArk - Software Vendor Identity and Access Management is Changing: Here\'s Where It\'s Headed 2021-12-01T13:00:29+00:00 https://www.cyberark.com/blog/identity-and-access-management-is-changing-heres-where-its-headed/ www.secnews.physaphae.fr/article.php?IdArticle=4593641 False None None None CyberArk - Software Vendor Unwrapping Retail\'s Cloud Security and eCommerce Risks this Holiday Season 2021-11-24T15:21:19+00:00 https://www.cyberark.com/blog/unwrapping-retails-cloud-security-and-ecommerce-risks-this-holiday-season/ www.secnews.physaphae.fr/article.php?IdArticle=4593642 False None None None CyberArk - Software Vendor How to Use the MITRE ATT&CK Framework to Fight Ransomware Attacks 2021-11-22T17:00:22+00:00 https://www.cyberark.com/blog/how-to-use-the-mitre-attck-framework-to-fight-ransomware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=4593643 False Ransomware None None CyberArk - Software Vendor What is SASE and How Does it Relate to Zero Trust? 2021-11-18T14:00:00+00:00 https://www.cyberark.com/blog/what-is-sase-and-how-does-it-relate-to-zero-trust/ www.secnews.physaphae.fr/article.php?IdArticle=4593644 False None None None CyberArk - Software Vendor Breaking Down the CMMC and How CyberArk Can Help Support Compliance 2021-11-16T14:00:01+00:00 https://www.cyberark.com/blog/breaking-down-the-cmmc-and-how-cyberark-can-help-support-compliance/ www.secnews.physaphae.fr/article.php?IdArticle=4593645 False None None None CyberArk - Software Vendor What a 100-Year Plant Disease Reveals About Endpoint Privilege Security 2021-11-09T14:00:20+00:00 https://www.cyberark.com/blog/what-a-100-year-plant-disease-reveals-about-endpoint-privilege-security/ www.secnews.physaphae.fr/article.php?IdArticle=4593646 False None None None CyberArk - Software Vendor Why Reporting Cybersecurity Business Impact is About Seeing the Forest from the Trees 2021-11-05T13:00:01+00:00 https://www.cyberark.com/blog/why-reporting-cybersecurity-business-impact-is-about-seeing-the-forest-from-the-trees/ www.secnews.physaphae.fr/article.php?IdArticle=4593647 False None None None CyberArk - Software Vendor Unmask Insider Threats and Errors – Regain Security Control 2021-11-02T13:19:58+00:00 https://www.cyberark.com/blog/unmask-insider-threats-and-errors-and-regain-security-control-with-cyberark-identity-secure-web-sessions/ www.secnews.physaphae.fr/article.php?IdArticle=4593648 False None None None CyberArk - Software Vendor What Squid Game Reminds Us About Cybersecurity 2021-10-28T13:55:37+00:00 https://www.cyberark.com/blog/what-squid-game-reminds-us-about-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=4593649 False None None None CyberArk - Software Vendor Make Cybersecurity a Priority with Tips from Work and Personal Life 2021-10-26T13:00:15+00:00 https://www.cyberark.com/blog/make-cybersecurity-a-priority-with-tips-from-work-and-personal-life/ www.secnews.physaphae.fr/article.php?IdArticle=4593650 False None None None CyberArk - Software Vendor Why Tackling Serverless IAM Threats Takes a Team 2021-10-21T15:00:15+00:00 https://www.cyberark.com/blog/why-tackling-serverless-iam-threats-takes-a-team/ www.secnews.physaphae.fr/article.php?IdArticle=4593651 False None None None CyberArk - Software Vendor INTENT Security Research Summit: Explore. Experience. Share. 2021-10-19T13:00:31+00:00 https://www.cyberark.com/blog/intent-security-research-summit-explore-experience-share/ www.secnews.physaphae.fr/article.php?IdArticle=4593652 False None None None CyberArk - Software Vendor Software Supply Chain Attacks: Who Owns the Risk and What Can Be Done? 2021-10-15T12:00:46+00:00 https://www.cyberark.com/blog/software-supply-chain-attacks-who-owns-the-risk-and-what-can-be-done/ www.secnews.physaphae.fr/article.php?IdArticle=4593653 False None None None CyberArk - Software Vendor 8 Ways to “Fight the Phish” this Cybersecurity Awareness Month 2021-10-13T20:12:35+00:00 https://www.cyberark.com/blog/8-ways-to-fight-the-phish-this-cybersecurity-awareness-month/ www.secnews.physaphae.fr/article.php?IdArticle=4593654 False None None None CyberArk - Software Vendor Hybrid Work Brings DaaS and Endpoint Risks 2021-10-07T13:00:40+00:00 https://www.cyberark.com/blog/hybrid-work-brings-daas-and-endpoint-risks/ www.secnews.physaphae.fr/article.php?IdArticle=4593655 False None None None