Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CyberArk

Below you will find reports with the source of “CyberArk”

image from Threat Landscape Report 2024

Threat Landscape Report 2024

This year we find that cyber debt continues to build with GenAI, rise of machine identities, and increasing third- and fourth-party risks. This growth in vulnerable identities, boosted by the ongoing AI transformation and pervasive cloud computing, is a here-and-now threat ready to be exploited by bad actors with the AI-powered ability to execute at scale. Perhaps the only thing more disturbing than the emergence of deepfake videos is our collective overconfidence that we won’t be fooled by them.

(more available)
Added: March 18, 2025
image from Threat Landscape Report 2024

Threat Landscape Report 2024

In this report, nearly half of organizations anticipate a threefold increase in the total number of identities, with machine identities squarely in the driver’s seat (but largely under-secured and over-privileged). This growth in vulnerable identities, boosted by the ongoing AI transformation and pervasive cloud computing, is a here-and-now threat ready to be exploited by bad actors with the AI-powered ability to execute at scale. In the last 12 months, 93% of organizations suffered two or more identity-related breaches.

(more available)
Added: February 5, 2025
image from 2023 Identity Security Threat Landscape Report

2023 Identity Security Threat Landscape Report

Our new report examines how the interplay of all these factors will result in increased attacker opportunity. Indeed, as adversaries embrace artificial intelligence (AI) to enhance and scale their identity based attacks, security teams are being asked to do more with less as budget cuts widen existing skills and resource gaps.

(more available)
Added: August 24, 2023
image from An Attack Pathway Into Your Organization? There's An App For That

An Attack Pathway Into Your Organization? There's An App For That

Recommendations for securing and managing privileged credentials used by enterprise applications

Added: October 26, 2018
image from Securing The Enterprise's Cloud Workloads On Microsoft Azure

Securing The Enterprise's Cloud Workloads On Microsoft Azure

This paper seeks to help organizations understand that Microsoft Azure (Azure) has a lot more to offer than cost savings. Enterprises with the highest levels of cloud adoption, typically, not only completely re-architect their applications, but also take advantage of automation to streamline the entire development and deployment process. They adopt DevOps pipelines and use CI/CD (continuous integration and continuous delivery) tools with the objective of nimbly meeting customer and business needs.

(more available)
Added: October 26, 2018
image from Addressing The Australian Signals Directorate Essential Eight

Addressing The Australian Signals Directorate Essential Eight

In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines.

(more available)
Added: October 25, 2018
image from Securing The Enterprise's Cloud Assets On Amazon Web Services

Securing The Enterprise's Cloud Assets On Amazon Web Services

This report provides helpful advice on how to secure Cloud Assets on Amazon’s Web Services.

Added: October 25, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.

Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

This report provides insight into Australian Data Breach Protocol.

Added: October 21, 2018
image from Global Advanced Threat Landscape Survey 2016

Global Advanced Threat Landscape Survey 2016

The 10th annual CyberArk Global Advanced Threat Landscape Survey 2016, themed “Cyber Security: Past, Present & Future,” examines whether global enterprises are learning and applying lessons as a result of years of highly publicized cyber attacks, and how security priorities and decision making are being impacted.

(more available)
Added: October 20, 2018
image from Global Advanced Threat Landscape Survey 2018: Focus On DevOps

Global Advanced Threat Landscape Survey 2018: Focus On DevOps

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. This is part one, focusing on how privileged account security is incorporated into DevOps processes.

(more available)
Added: October 19, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 4, 2025 08:08 UTC (build b1d7be4)