Look for any podcast host, guest or anyone
Showing episodes and shows of

CyberArk

Shows

Daily Security ReviewDaily Security ReviewCritical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at RiskEnterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE), privilege escalation, and even full system takeover—all without a password or token.These aren’t just theoretical risks. The vulnerabilities could give attackers access to every database, every API key, every cloud resource—the very lifeblood of an enterprise’s security posture. In some cases, Cyata researchers demonstrated that a single unauthentica...2025-08-0737 minBlue SecurityBlue SecurityPalo Alto acquires Cyberark, Sentinel News, MDTI is going to be FREE!SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant developments in the cybersecurity landscape, including Palo Alto's acquisition of CyberArk, the introduction of Microsoft Sentinel's Data Lake feature, and the integration of Defender Threat Intelligence into existing Microsoft security solutions. They emphasize the importance of a platform approach to cybersecurity and the challenges associated with acquisitions in the industry.----------------------------------------------------YouTube Video Link: https://youtu.be/8BRxQUyHNh4----------------------------------------------------Documentation:https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leaderhttps://techcommunity.microsoft...2025-08-0533 minThe TechTual TalkThe TechTual TalkEp.184 Cyber News: PaloAlto buys CyberArk,Tea App Hacked again, Tech Women leave TikTokBook a call here: https://calendly.com/techtuaulconsulting------------------------------------------------------------------------------------In this episode of The TechTual Talk HD and Cybershortieee cover the Tea app new hack, where private messages were leaked. They also discuss paloalto $25 billion acquisition of CyberArk, St. Paul suffered a cuber attack, oversharing in tech careers, the risks of AI deepfakes, and corporate workplace issues. #technews #corporateamerica #cybersecurity------------------------------------------------------------------------------------Learn how you can work with me one on one to secure a $90K+ cybersecurity role: https://techtualconsulting.tech/video-trainingjoin the discord here: https://dis...2025-08-051h 09Techzine TalksTechzine TalksPalo Alto Networks koopt CyberArk voor 25 miljard: wat betekent dit?In deze aflevering van Techzine Talks bespreken Coen en Sander de megaovername van CyberArk door Palo Alto Networks voor 25 miljard dollar. We duiken diep in wat deze consolidatie betekent voor de cybersecurity-industrie en waarom identity access management en ook privilege access management nu zo cruciaal wordt.De overname toont de strategische shift naar identity-first security, gedreven door AI en machine identities. We analyseren of dit goed uitpakt voor bestaande CyberArk-klanten en hoe dit past in de bredere trend van security-platformconsolidatie.Hoofdstukken:0:20 Welkom en technische updates1:03 De 25 miljard dollar overname2:13 Palo Alto's platformstrategie2025-08-0422 minCyberHub PodcastCyberHub PodcastIBM Reports $5.9M Average Breach Cost, SafePay Threatens 35TB Ingram Micro Leak, ShinyHunters Hit Qantas & Allianz, Palo Alto Buys CyberArk $25B🎙️ $5.9M Breach Costs by IBM, 35TB Ingram Micro Threat, Palo Alto Buys CyberArk $25B 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitionersEp – 954: Today's episode will discuss the latest news as Orange Telecom France Hit by Cyberattack with more news below:·      ShinyHunters Behind Salesforce Data Theft Attacks at Qantas, Allianz Life, and LVMH·      Patents Reveal Silk Typhoon Company Operations in Beijing·      Apple Patches Security Flaw Exploited in Chrome Zero-Day Attacks For more information, please visit our website: https://www.cy...2025-07-3118 minKuppingerCole AnalystsKuppingerCole AnalystsPalo Alto + CyberArk? A Strategic Expansion Into Identity Security — But With QuestionsIn a groundbreaking move, Palo Alto targets a $25 billion acquisition of CyberArk, poised to reshape identity security landscapes. As two cybersecurity giants converge, explore this narrative of strategic synergy versus the challenge of seamless integration. With potential market upheaval at stake, the acquisition promises to redefine the rules of identity security. Read the original blog post here: https://www.kuppingercole.com/blog/leal/palo-alto-cyberark-a-strategic-expansion-into-identity-security-but-with-questions2025-07-3016 minSecurity MattersSecurity MattersEP 12 - From assumptions to accountability: A CISO’s take on cloud riskWhat does "secure by default" really mean—and is it enough? In this episode of CyberArk’s Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company’s AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accoun...2025-07-2941 minSecurity MattersSecurity MattersEP 10 - A new identity crisis: governance in the AI ageIn this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.Listeners will learn:Why legacy identity governance models are breaking under cloud scaleHow AI agents are reshaping entitlement management and threat detectionWhat organizations must do to secure non...2025-06-2636 minSecurity MattersSecurity MattersEP 8 - Zero Trust, Zero Chill: Securing Machine IdentityIn this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.According to the CyberArk 2025 Identity Security Landscape, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages...2025-05-2845 minDefence Connect Podcast NetworkDefence Connect Podcast NetworkCYBER UNCUT: CyberArk’s Thomas Fikentscher on why cyber security should not be an afterthoughtIn this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk’s head of ANZ operations, to explore the company’s international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberArk’s international operations and recent trends regarding how businesses are looking at their networks and what’s essential to keep their operations running smoothly. The pair then discuss the importance of understanding and implementing privileged access to data and how that can keep critical infrastr...2025-05-2633 minCyber UncutCyber UncutCyberArk’s Thomas Fikentscher on why cyber security should not be an afterthoughtIn this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk’s head of ANZ operations, to explore the company’s international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberArk’s international operations and recent trends regarding how businesses are looking at their networks and what’s essential to keep their operations running smoothly. The pair then discuss the importance of understanding and implementing privileged access to data and how that can keep critical infrastr...2025-05-2633 minSecurity MattersSecurity MattersEP 6 - Incident Response POV: 2025 Emerging ThreatsIn this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't...2025-04-3036 minSecurity MattersSecurity MattersEP 3 - Building Trust in AI AgentsIn this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety...2025-03-1338 minSecurity MattersSecurity MattersEP 2 - Dispatch From Retail's Frontline: Building Cyber ResilienceIn this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats. Discover the strategies for building cyber resilience, the role of AI in retail, the importance of protecting consumer trust and the critical role of identity in safeguarding sensitive data. JJ's journey from tech enthusiast to CIO offers actionable...2025-02-2748 minUnlock Cloud Go-to-MarketUnlock Cloud Go-to-MarketCyberArk’s Strategy for Building Partner Ecosystems"Marketplaces are the future of SaaS sales, but success requires aligning with partners and embracing innovation." – Brennan Lynch, Global Director of Cloud Marketplaces at CyberArkIn today’s episode of Unlock Cloud Go-To-Market, host Patrick Riley is joined by Brennan Lynch, Global Director of Cloud Marketplaces at CyberArk, and Brian Denker, Co-Founder of Tackle, to discuss the evolution of cloud marketplaces and partner-driven success. Brennan shares insights on fostering strong partnerships, navigating marketplace adoption, and leveraging operational efficiencies to scale cloud operations effectively.The conversation explores partner collaboration, the impact of CPPO (Channel Partner Priv...2025-02-1944 minTechCrunch Industry NewsTechCrunch Industry NewsCyberArk snaps up Zilla Security for up to $175MInformation security company CyberArk has acquired identity access and governance platform Zilla Security in a deal worth up to $175 million. Founded in 1999, Boston-based CyberArk specializes in access management, including privileged access security which helps organizations protect sensitive data and critical infrastructure from external (and internal) threats. Learn more about your ad choices. Visit podcastchoices.com/adchoices2025-02-1403 minPantheonAIPantheonAIInflation Pressures, Crypto Pullback, Big Tech Moves, Tarriffs, CyberArk, Wholesale Prices Surge – Fed Rate Cuts at Risk?Come check us out on our landing page, and also on our Twitter/X. 📢 PAI Morning Briefing – February 13, 2025 | Inflation Pressures, Crypto Pullback, and Big Tech Moves!🔥 Markets hold steady despite inflation fears! Crypto takes a hit, tail risk looms, and major acquisitions shake up cybersecurity and tech. Don’t miss today’s deep dive into the biggest financial headlines!🔴 TODAY’S MARKET OVERVIEW📈 Stock Market Performance:✔ S&P 500: 6,068 (+0.12%)✔ Dow Jones: 44,442 (+0.03%)✔ Nasdaq: 19,761 (+0.32%)✔ Russell 2000: 2,256 (+0.23%)💰 Crypto Market Update:✔ Bitcoin (BTC): $96,596 (-1.94%)2025-02-1321 minSecurity MattersSecurity MattersEP 1 - AI Gone Rogue: FuzzyAI and LLM ThreatsIn the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.What's Security Matters? Check out the show trailer to learn more. Make us your...2025-02-1235 minSecurity MattersSecurity MattersWelcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)Welcome to Security Matters, the next evolution of CyberArk’s podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security.Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Matters refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect th...2025-02-0701 minAnker-Aktien PodcastAnker-Aktien PodcastSecunet vs. CyberArk Aktien-Duell 2025 // Welche Cybersecurity-Aktie hat das größere Potenzial?In diesem Podcast nehmen wir die beiden führenden Cybersecurity-Unternehmen Secunet Security Networks und CyberArk Software unter die Lupe. Beide Firmen sind im Bereich des Zugriffsmanagements tätig, verfolgen jedoch unterschiedliche Strategien und Zielmärkte. Während Secunet stark auf den öffentlichen Sektor in Deutschland und Europa fokussiert ist – mit Behörden, Verteidigungsministerien und dem Gesundheitswesen als Kunden – konzentriert sich CyberArk auf internationale Unternehmen und bietet umfassende Lösungen für den privaten Sektor. Wir vergleichen die Geschäftsmodelle, Wachstumsperspektiven und finanziellen Kennzahlen beider Unternehmen und beleuchten, welche Aktie langfristig mehr Potenzial bietet. Wie schlagen sich die Unternehmen in...2025-01-2431 minSecurity MattersSecurity MattersEP 70 - Zero Days and High Stakes: The US Treasury AttackIn this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk’s Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, "The US Tr...2025-01-2326 minAWS for Software Companies PodcastAWS for Software Companies PodcastEp070: How CyberArk Scaled SaaS Transformation: Insights from CyberArk’s SVP Corporate Finance Nili Serr-ReuvenThis illuminating conversation with CyberArk's SVP of Finance, Nili Serr-Reuven, reveals how the 25-year-old cybersecurity leader successfully transformed from a traditional software company to a SaaS business model in just five quarters - far faster than the industry standard of 2-2.5 years - while maintaining strong margins and customer trust throughout the transition.Topics Include:Introduction to SaaS transformation challenges and opportunities.Tomaz Perc introduces Nili Serr Reuven from CyberArk.Overview of CyberArk's 25-year history and milestones.Transition from a perpetual model to SaaS.CyberArk's accelerated transformation in just five quarters.Challenges of shifting from product-centric...2024-12-1941 minSecurity MattersSecurity MattersEP 66 - Post-Election Insights: AI, Misinformation and SecurityIn this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James ex...2024-11-2137 minUnlock Cloud Go-to-MarketUnlock Cloud Go-to-MarketCyberArk’s Secret to a Tenfold Revenue Boost in Just 30 Months“Selling is the party. But like any great party, a lot of preparation is essential to make it successful.” - Brennan Lynch, Director of Global Marketplaces at CyberArkIn today's episode of Unlock Cloud Go-To-Market, hosts Erin Figer and Patrick Riley are joined by Brennan Lynch, the Director of Global Marketplaces at CyberArk. Lynch discusses the intricacies of Cloud go-to-market strategies while emphasizing the extensive preparation necessary for successful sales, the critical role of internal alignment, and the value of engaging Cloud service providers early and effectively.Brennan discusses the...2024-10-3147 minThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital KingdomThe Keys 2 Your Digital Kingdom - Episode 11: “CyberArk & Venafi: Navigating Machine Identities in a New Era of Security”In this episode of The Keys 2 Your Digital Kingdom, we dive into the acquisition of Venafi by CyberArk and what it means for the future of machine identity management. Our guest, Stefan Bartels, Sales Representative for DACH at Venafi, a CyberArk company, joins us to explain the basics of machine identities, why they matter, and the best practices for managing them securely. We explore how the integration of Venafi’s expertise into CyberArk’s platform strengthens security around machine identities and discuss the practical steps companies can take to protect their digital assets in a rapidly evolving landscape. Tune in f...2024-10-2921 minSecurity MattersSecurity MattersEP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical HackerIn this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker," which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.2024-10-2350 minEarnings Report DigestEarnings Report DigestCyberark (CYBR) 2024Q2 10-QCyberArk, a company focused on identity security, announced strong second quarter 2024 financial results. The company exceeded its guidance in all metrics, reporting record revenue and increased profitability. Key drivers of the strong performance include a 50% year-over-year growth in the subscription portion of annual recurring revenue (ARR) and a 33% year-over-year increase in total ARR. CyberArk also signed 245 new customer agreements and raised its full-year guidance. The company attributes its success to the growing need for comprehensive identity security solutions in a rapidly evolving technological landscape.2024-10-1609 minSecurity MattersSecurity MattersEP 63 - Jailbreaking AI: The Risks and Realities of Machine IdentitiesIn this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks. The conversation also touches on the concept of responsible AI and the importance of building secure AI systems. Tune in to learn about the fascinating world of AI security and the...2024-10-0936 minSecurity MattersSecurity MattersEP 58 - Trust and Resilience in the Wake of CrowdStrike's Black SwanIn this episode of Trust Issues, we dig into the recent the global IT outage caused by a CrowdStrike software update, which impacted millions of Microsoft Windows endpoints and disrupted many sectors. This "black swan" event highlights, among other things, the importance of preparedness, adaptability and robust crisis management. CyberArk Global Chief Information Officer (CIO) Omer Grossman discusses with host David Puner the outage's ramifications, the shaking of trust in technology – and the criticality of resilience against cyberthreats. This conversation underscores the need to be ready for the unexpected and the value of adaptability and resilience in unforeseen circumstances. 2024-07-3027 minSecurity MattersSecurity MattersEP 57 - Proactive Defense: Security's AI InfusionIn this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI...2024-07-2332 minSecurity MattersSecurity MattersEP 55 - AI Insights: Shaping the Future of IAMIn this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company’s Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the me...2024-06-2535 minChip Stock Investor PodcastChip Stock Investor PodcastEpisode 157: Investing In Top Cybersecurity Stocks? Okta, Cyberark, & Profiting From Identity Management🔒🔑Chip Stock Investor dives deep into the Identity Access Management (IAM) sector of cybersecurity. We analyze key players like Microsoft (MSFT) Okta (OKTA) and CyberArk (CYBR), with a special focus on CyberArk's recent deals and acquisition. Learn the difference between IAM and Privileged Access Management (PAM), understand the significance of machine identity management, and get insights into CyberArk's financials, strategy, and future in the ever-evolving industry. 👉👉 Chip Stock Investor offers a premium membership that gives you: Community: 🙏 Connect with other investors interested in chip stocks. Direct Access: 🗣️🦜Chat with the Chip Stock Investor experts. Insider Knowledge: 🤔💭Gain valuable insights into the chip stock mar...2024-06-1017 minInfosecTrainInfosecTrainCyberArk Basics to Advanced Ultimate Training TutorialUnlock the full potential of CyberArk with our comprehensive training Podcast, designed to take you from basic to advanced levels. Whether you're just starting or looking to enhance your skills, this podcast covers everything you need to know about CyberArk, the industry-leading privileged access management solution. ✅In This Podcast, you will learn: 👉 Introduction to InfosecTrain 👉 Introduction to CyberArk 👉 What is PAM? 👉 Risks and requirements 👉 Why Learn CyberArk 👉 CyberArk Q&A2024-05-2849 minBoardroom ClubBoardroom ClubTech Conference: CyberArk new AI centerCatch a glimpse of our interview with Udi Mokady, Founder and Executive Chairman at CyberArk (NASDAQ: CYBR), as we discuss CyberArk's innovative AI Center of Excellence. Learn how it's poised to combat attacker innovation with cutting-edge identity security solutions.Watch the rest of the interview here:Udi Mokady CyberArk Interview.mp4Interviewers: ⁠Yossi Garmazi⁠ & ⁠Álvaro Jiménez Cabello de los Cobos⁠. For more info please visit our LinkedIn page: ⁠Boardroom Club⁠.#CyberSecurity #hightech #CyberArk #entrepreneur #nasdaq2024-05-2103 minSecurity MattersSecurity MattersEP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi MokadyIn this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company’s 25th anniversary. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he's learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. And, because we say...2024-05-1053 minSecurity MattersSecurity MattersEP 50 - Adversarial AI's AdvanceIn the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the Cyber Cognition podcast (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the ro...2024-04-1740 minSecurity MattersSecurity MattersEP 49 - Secure Browsing and Session-Based ThreatsIn this episode of Trust Issues, David welcomes back Shay Nahari, VP of CyberArk Red Team Services, to discuss the topic of secure browsing and session-based threats. They delve into the dangers of cookie theft, the expanding attack surface, and the importance of identity security. Shay explains how cookies sit post-authentication and how attackers can bypass the entire authentication process by stealing them. He also discusses how browsers have been designed for consumers, not for the enterprise, and how this creates a fundamental problem in the way we treat and design identities around the usage of browsers... until now...2024-04-0330 minInfosecTrainInfosecTrainMastering CyberArk What is Privileged Access Management PAMIn an era where cyber threats are evolving with unprecedented speed and sophistication, safeguarding privileged access within an organization's IT environment has never been more critical. InfosecTrain is thrilled to announce an exclusive session, "Mastering CyberArk: What is Privileged Access Management (PAM)?", designed to equip IT professionals, security enthusiasts, and anyone interested in cybersecurity with the knowledge and skills to implement and manage a robust PAM strategy using CyberArk, the leader in privileged access management. ➡️ Agenda for the Session ✔ Introduction to Privileged Accesses ✔ Risks Associated with Privileged Accounts ✔ Requirements of a PAM Solution ✔ Overview of Course Content ✔ Q/A Session 2024-03-2851 minTech Talks DailyTech Talks DailyCelebrating Women's Influence on International Women's Day With CyberArkIn a world where the digital landscape is continually evolving, how do we ensure that women's voices are heard and valued, especially in the tech sector? This International Women's Day, join us on Tech Talks Daily Podcast as we sit down with Eduarda Camacho, the dynamic COO of CyberArk, a global leader in identity security. From facing doubts about her potential in tech due to her gender, nationality, and non-engineering background to ascending to the executive ranks and making a significant impact, Eduarda's journey is nothing short of inspiring. In this candid conversation, Eduarda shares the challenges...2024-03-0821 minSecurity MattersSecurity MattersEP 46 - Behind the Data Breach: Dissecting Cozy Bear's Microsoft AttackAndy Thompson, CyberArk Labs Offensive Security Research Evangelist returns to Trust Issues for a deep dive into the recent APT29 breach of Microsoft. In conversation with host David Puner, Thompson explores the intricate details of the January 2024 attack, dissecting the tactics employed by the APT29 threat actor, also known as Cozy Bear, Cozy Car, The Dukes – or, as Microsoft refers to the group: Midnight Blizzard. From the initial password spray technique to the exploitation of OAuth applications, listeners are taken on a journey through the breach's timeline – and learn how, ultimately, it all boils down to identity. The discussion touc...2024-02-1531 minSecurity MattersSecurity MattersEP 44 - The Rise of Prompt Engineering: How AI Fuels Script KiddiesIn this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of...2024-01-2533 minSecurity MattersSecurity MattersEP 42 - Year in Review 2023: Unleashing AI, Securing IdentitiesIn this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show’s 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a pe...2023-12-2735 minInfosecTrainInfosecTrainHow Does CyberArk Work For PAM?In today’s digitally-driven world, protecting sensitive data and privileged accounts from cyber threats is paramount. With the constant evolution of cybersecurity threats, organizations must stay ahead to safeguard their assets proactively. One effective tool that has emerged in the past few years to address this challenge is CyberArk, a top provider of Privileged Access Management (PAM) solutions. In this blog, we will delve into how CyberArk works for PAM and what are its critical benefits for PAM. What is Privileged Access Management (PAM)? Privileged Access Management (PAM) refers to a set of cybersecurity practices, po...2023-12-2205 minSecurity MattersSecurity MattersEP 39 - Analyzing the MGM and Okta Breaches: the Identity ConnectionIn this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs' Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta's support unit. The conversation delves into the details of the attacks – who’s behind them, how identity plays a pivotal role in both – and the larger implications of this new breed of supply chain attack amid the evolving threat landscape. Thompson also shares insights into how organizations can better protect themselves and their customers. Check out the CyberArk blog fo...2023-11-0232 minSecurity MattersSecurity MattersEP 38 - Why Cloud Security Doesn't Taste Like ChickenToday’s guest is Charles Chu, CyberArk's General Manager of Cloud Security, who’s spent more than a decade at the forefront of cloud security. Chu joins host David Puner for a conversation that delves into secure cloud access and the concept of zero standing privileges (ZSP), a dynamic approach to securing identities in multi-cloud environments. Chu sheds light on the complexities of cloud security, emphasizing the need for tailored solutions to protect against evolving cyber threats. Don't miss this insightful conversation that demystifies cloud security and redefines safeguarding digital assets – and answers the pivotal question: Why doesn’t cloud se...2023-10-1936 minSecurity MattersSecurity MattersEP 35 - Threat Innovations: Exploring Cascading Supply Chain AttacksIn this episode, we welcome back Shay Nahari, VP of CyberArk Red Team Services. His discussion with host David Puner revolves around attacker innovation, focusing on key areas like cascading supply chain attacks and session cookie hijacking. Lean in as Nahari explains how the Red Team simulates real-world attacks to help organizations identify vulnerabilities and improve their security posture.  2023-09-0725 minTech Talks DailyTech Talks DailyCyberArk - Unearthing the Hidden Dangers in Communication PlatformsIn this intriguing episode, I welcome David El, Malware Researcher at CyberArk, to discuss the underbelly of popular communication platforms like Discord. While the recent Pentagon document leaks via Discord have alerted us to the platform's potential misuse, new research from CyberArk Labs has shed light on the magnitude of these threats. David delves into the specifics of the newly discovered malware, its operations, the implications it poses, and the indicators of compromise (IOCs) organizations should watch out for. He takes us behind the scenes, narrating how they unearthed a burgeoning cybercrime group while infiltrating their Discord...2023-07-2721 minSecurity MattersSecurity MattersEP 32 - Building Trust and Collaboration in Identity Security w/ CyberArk CEO Matt CohenIn this episode of Trust Issues, host David Puner talks with CyberArk CEO Matt Cohen, who shares his distinct take on leadership – emphasizing the importance of leading without fanfare. Cohen talks about his transition into the CEO role, insights on identity security and the current threat landscape. He also touches on the significance of company culture, professional development – and his admiration for a particular Boston Red Sox manager’s leadership style. The discussion delves into CyberArk's mission to secure the world against cyber threats by securing identities, and empower organizations to move forward, fearlessly to unlock growth, innovation and progre...2023-07-2039 minSecurity MattersSecurity MattersEP 31 - How Generative AI is Reshaping Cyber ThreatsWhile generative AI offers powerful tools for cyber defenders, it's also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology. In this episode, CyberArk Labs’ Vice President of Cyber Research Lavi Lazarovitz, discusses with host David Puner the seismic shift generative AI is starting to bring to the threat landscape – diving deep into offensive AI attack scenarios and the implications for cyber defenders. 2023-07-0639 minSecurity MattersSecurity MattersEP 29 - Synthetic Identity: Unmasking a New AI-Fueled Cyber ThreatScattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk’s resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, th...2023-06-0724 minSecurity MattersSecurity MattersEP 26 - Ransomware Revisited: Combating the Identity ExplosionAndy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what's causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks. As more organizations adopt cloud and DevOps technologies, the number of digital identities has skyrocketed, providing attackers with more accounts to exploit. However, Thompson emphasizes that staying vigilant about...2023-04-2625 minSecurity MattersSecurity MattersEP 24 - Making the Leap to Post-Quantum Computing EncryptionQuantum computing is coming and it has the potential to be both exciting and terrifying... On today's episode of Trust Issues, host David Puner speaks with cryptographer Dr. Erez Waisbard, CyberArk’s Technology and Research Lead, about quantum computing innovation and its cybersecurity implications – from data encryption to surveillance and privacy. Dr. Waisbard breaks down how encryption works, why it’s so important for safeguarding our data, and how quantum computers will break the methods used today. This may sound ominous, but designs for quantum-resistant encryption algorithms are already well underway. Check out the episode to learn more ab...2023-03-3019 minSecurity MattersSecurity MattersEP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber JourneyToday's guest is Den Jones, who's Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he's a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge. In this episode, host David Puner talks with Jones about his singular cybersecurity career path – beginning with a formative stint as a Royal Mail postman in Scotland – and how he worked his way up the ladde...2023-03-1527 minInfosecTrainInfosecTrainWhat is a CyberArk Vault? | Why CyberArk Vault Is Still Important? | InfosecTrainThe CyberArk Vault is designed to be highly secure, with features such as multi-factor authentication, encryption, and auditing. It allows administrators to control access to sensitive information, and monitor usage and activity. The CyberArk Vault integrates with a wide range of systems, including cloud platforms and enterprise applications, making it a flexible solution for securing privileged access across an organization's infrastructure.   #CyberArkVault #cyberark #cybersecurity #security #learntorise #infosectrain #CyberArk  Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com   ➡️ Agenda for the Webinar 2023-02-2428 minInfosecTrainInfosecTrainWhat is CyberArk Report | Reports in CyberArk | InfosecTrainCyberArk is a security software company that provides solutions for privileged access management. One of the features of CyberArk is the ability to generate reports to provide information about privileged access activities, security incidents, and risk analysis.   #cyberarkreport #cyberark #cybersecurity #identitysecurity #privilegedaccessmanagement #cyberarktutorialforbeginners #cyberarkinterviewquestions #identityandaccessmanagement #security #infosectrain    Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com   ➡️ Agenda for the Webinar  👉 Reports in CyberArk2023-02-2435 minInfosecTrainInfosecTrainCyberArk Basic Troubleshooting Steps | What is CyberArk? | InfosecTrainCyberArk is a privileged account security solution that helps organizations secure, manage, and monitor the access and use of sensitive data and systems. Here are some common troubleshooting steps that can help resolve issues with CyberArk:   Verify login credentials: Ensure that the username and password being used to log in to CyberArk are correct.   Check network connectivity: Ensure that the machine trying to access CyberArk is able to reach the CyberArk server and that the required ports are open.   Check system requirements: Ensure that the machine trying to access CyberArk meets the minimum syste...2023-02-2427 minInfosecTrainInfosecTrainWhat is CyberArk | CyberArk Full Introduction | InfosecTrainThank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com   #cyberark #privilegedaccessmanagement #cybersecurity #identitysecurity #pam #infosectrain    ➡️ Agenda for the Webinar 👉 What is CyberArk2023-02-2232 minSecurity MattersSecurity MattersEP 20 - Hacking ChatGPTEven if you've been living under a super-sized rock for the last few months, you've probably heard of ChatGPT. It's an AI-powered chatbot and it's impressive. It's performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental. That's where today's guest Eran Shimony, Principal Security Researcher for CyberArk Labs, comes into the picture. In fact, in an effort to stay ahead of the bad guys...2023-02-0126 minSecurity MattersSecurity MattersEP 18 - Why Protecting Critical Infrastructure is Critical in 2023We're starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we're seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries. On today’s episode, host David Puner talks with David Higgins, who’s a Senior Director in CyberArk‘s Field Technology Office, about how the critical infrastructure landscape has changed, its global implications and how cyber protectors have had to adapt.2023-01-0537 minSecurity MattersSecurity MattersEP 16 - Beware of Stolen Cookies for MFA BypassToday's episode is a bit of a year-end cybersecurity fortune cookie. Its focus is an attack trend that's surged in 2022: Cookie hijacking (aka stolen cookies). Session cookies, that is. And it’s an attack trend CyberArk Labs researchers predict will continue to flourish in 2023. To dig into the stolen cookies trend and what's coming next, host David Puner talks with VP of CyberArk Red Team Shay Nahari, and Research Evangelist of CyberArk Labs, Andy Thompson, both of whom have spent a considerable amount of time popping the hood on the trend. And it's something you should be thinking about to...2022-12-0634 minSecurity MattersSecurity MattersEP 13 - Cyber Fundamentals: Where Things Fall ApartEven when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that’s what, on today's episode, guest Bryan Murphy, CyberArk’s Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It’s a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a list...2022-10-1131 minSecurity MattersSecurity MattersEP 12 - K-12 Schools in Ransomware Crosshairs w/ Matt Kenslea, Director of State, Local and Education at CyberArkU.S. government agencies are warning that ransomware actors are "disproportionately targeting the education sector," especially K-12. That’s because sensitive student data, overworked staff and competing priorities make investing in cybersecurity talent and tools a major challenge. On today's episode, host David Puner checks in with Matt Kenslea, CyberArk's Director of State, Local and Education (SLED), for a discussion about these targeted cyberattacks, the challenges they pose – and what schools can do.2022-09-2724 minSecurity MattersSecurity MattersEP 11 - Step Away From the QR Code and Listen to This w/ Len Noe, Technical Evangelist & White Hat Hacker at CyberArkLen Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today’s episode, he’s talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.2022-09-1332 minSecurity MattersSecurity MattersEP 10 - Skating to Where the Cyber Puck’s Going, Not Where it’s Been w/ Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate DevelopmentSports, at their highest levels, are shaped by lifetimes dedicated to practicing, strategizing and anticipating. The same goes for cybersecurity. Although, in our world, it's not a game and there are no set parameters. On today’s episode, host David Puner speaks with Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development about looking into the future and preparing for the unknown. Like hockey, it’s about skating to where the puck’s going – not where it’s been. 2022-08-3030 minSecurity MattersSecurity MattersEp 8 - Seeing the Big Picture with Identity Security w/ Udi Mokady, Founder, Chairman and CEO of CyberArkFor every me or you, there are now 45 machine identities. That's 45 machine identities for every single human identity, according to the CyberArk 2022 Identity Security Threat Landscape Report. And 68% of those machine identities have some level of sensitive access. Attackers know this, and are doing their best to take advantage of those odds. Host David Puner sits down with Udi Mokady, Founder, Chairman and CEO of CyberArk, shortly after the wrap of the company’s Impact 2022 conference, for a talk about Identity Security – where CyberArk has been, where it's going – and a little about guitar playing too.  2022-08-0232 minSecurity MattersSecurity MattersEp 7 - Cyber Attack Cycle Deconstruction w/ Lavi Lazarovitz, Head of Security Research at CyberArk LabsHow do we stand a chance against emerging cyber threats? It's because, in large part, there are researchers at the cutting edge – dedicated to the pursuit and understanding of novel threats and vulnerabilities – by thinking just like attackers. That's the world in which Lavi Lazarovitz, CyberArk Labs’ Head of Security Research, lives and thrives. Lazarovitz leads an elite group of white hat hackers, intelligence experts and cybersecurity practitioners. Host David Puner talks with Lazarovitz about deconstructing the attack cycle and various ways to better understand how threat actors operate – in the ongoing effort to stay ahead of them.2022-07-1919 minSecurity MattersSecurity MattersEP 5 - Preparing for the Cyber Unknown w/ Shay Nahari, CyberArk VP of Red Team ServicesYou may have heard the famous Mike Tyson quote, “Everybody has a plan until they get punched in the face.” Applied to the context of cybersecurity, the message is – when things get real, what will you do? How will you react? You can attempt to prepare for seemingly every scenario under the sun, but you still can’t know when or how or where you'll actually get punched.   So how do you prepare for the unknown – for that metaphorical Iron Mike punch to the face? And what do you do when it happens? That's what host David Puner gets i...2022-06-2127 minSecurity MattersSecurity MattersEP 2 - Transhumanism: Charting the Cybersecurity Frontier w/ Len NoeIn our cyber world identities are typically split into two distinct categories: human and machine. But there's one notable intersection: cyborg. On today's episode, host David Puner talks with Len Noe, technical evangelist, white hat hacker – and CyberArk's resident transhuman.2022-05-1028 minSecurity MattersSecurity MattersEP 1 - Talking Ransomware w/ Andy ThompsonToday, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues™ podcast, David Puner talks about this and more with Andy Thompson, advisor & evangelist at CyberArk Labs.2022-04-2625 minSecurity MattersSecurity MattersTrust Issues TrailerTrailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022. 2022-04-1301 minAnalytics InsightAnalytics InsightExclusive Interaction with Rohan Vaidya, Managing Director, Cyberark IndiaIn the latest podcast session, Analytics Insight is in conversation with Rohan Vaidya, Managing Director of Cyberark India to talk about the cybersecurity industry and innovative solutions. Rohan Vaidya also discusses about how cyber attacks are getting sophisticated with technology advancements and how organizations should be mindful about choosing the right security solution and strategizing ahead of time.2021-07-0653 minThe Earnings Podcast from AlphaStreetThe Earnings Podcast from AlphaStreetCyberArk Software Ltd Q1 2021 Earnings CallCyberArk Software Ltd Q1 2021 Earnings Call --- Send in a voice message: https://podcasters.spotify.com/pod/show/earningspodcast/message Support this podcast: https://podcasters.spotify.com/pod/show/earningspodcast/support2021-06-021h 01The Earnings Podcast from AlphaStreetThe Earnings Podcast from AlphaStreetCyberArk Software Ltd Q4 2020 Earnings CallCyberArk Software Ltd Q4 2020 Earnings Call --- Send in a voice message: https://podcasters.spotify.com/pod/show/earningspodcast/message Support this podcast: https://podcasters.spotify.com/pod/show/earningspodcast/support2021-02-1859 minCYBERARKCYBERARKCYBERARK - "Troppi permessi nel Cloud: ecco come rimuoverli"CYBERARK - "Troppi permessi nel cloud: ecco come rimuoverli"Contenuto sponsorizzato In questo episodio siamo di nuovo in compagnia di Emilio Tonelli, che per CyberArk è Sales Engineer. Il tema della chiacchierata è Cloud Entitlement Manager, cioè la gestione dei permessi all'interno del cloud.La linea di CyberArk - racconta Emilio - è applicare il minor privilegio possibile, identificando e rimuovendo le autorizzazioni eccessive del cloud che possono lasciare le organizzazioni vulnerabili. In questo modo si riduce significativamente il rischio e si migliora la visibilità e la sicurezza generale. Secondo una recente ricerca ESG, infatti, accou...2020-12-1310 minTech Sales InsightsTech Sales InsightsE8 - Going Above and Beyond with Rich Wenning, CyberArkHe is the Senior Vice President of North American Sales for CyberArk. In this capacity, he leads an organization focused on CyberArk’s identity security portfolio. CyberArk protects against advanced cyber threats, supports compliance initiatives, and empowers digital transformation. Anchored in privilege access management, CyberArk adaptively manages access for a broad range of human and machine identities, from any location or device, across cloud and hybrid environments, and throughout the DevOps pipeline. He has over 25 years of industry experience, and he’s held a variety of senior leadership and client-facing positions with Palo Alto Networks, IBM, Cisco Syst...2020-12-0231 minCYBERARKCYBERARKCYBERARK - "Quasi un bambino su tre usa account aziendali"CYBERARK - "Quasi un bambino su tre usa account aziendali"A farcelo sapere è Raffaella Zilli, protagonista di questo podcast realizzato con il supporto di Radio IT.Raffaella è fresca di nomina come Channel Sales Manager di CyberArk per Italia e Malta, e in questa intervista con Igor (responsabile editoriale di Radio IT) racconta il suo percorso professionale, le sue passioni e come affronterà le sfide del suo nuovo ruolo.La sua storia professionale è quanto meno unica, poiché è difficile trovare una donna che sin dagli studi secondari si dedichi all'informatica e alla programmazione; Raffaella ci racconta quindi...2020-11-1121 minCYBERARKCYBERARKCYBERARK - "Gli investimenti in sicurezza crescono, ma si fa ancora troppo poco"CYBERARK - "Gli investimenti in sicurezza crescono, ma si fa ancora troppo poco"Contenuto sponsorizzatoIn questo podcast, realizzato con il supporto di Radio IT, siamo in compagnia di Paolo Lossa, Country Sales Manager di CyberArk. Paolo è fresco di nomina nel suo ruolo, e da quell'osservatorio è certamente la persona più accreditata per darci qualche numero utile a capire l'andamento del mercato e degli investimenti in cybersecurity. Durante l'intervista con Igor (Responsabile editoriale di Radio IT) emerge sicuramente l'impatto avuto dalla pandemia di Covid-19 sul mercato di settore. Da una parte, la crescita deg...2020-10-0918 minCYBERARKCYBERARKCYBERARK - "Bisogna imparare a pensare come un hacker"CYBERARK - "Bisogna imparare a pensare come un hacker"Contenuto sponsorizzatoIn questo podcast, realizzato con il supporto di Radio IT, Emilio Tonelli (Solution engineer di Cyberark) ci spiega perché si deve imparare a pensare come chi attacca le aziende.Solo così, dice Emilio, si può capire bene come proteggere l'ambiente IT aziendale e soprattutto gli accessi privilegiati, elementi chiave - è il caso di dirlo - per entrare nei sistemi digitali delle organizzazioni e impadronirsi dei loro dati.Emilio rimarca però come manchi l'attenzione a come si costruiscono quegli accessi, troppo spesso costi...2020-09-2321 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)DigiCert Automation Gateway, Veracode Security Labs, & CyberArk Shadow Admin - ESW #193Tanium offering new cybersecurity service through a partnership with Google Cloud, CyberArk launches open-source Shadow Admin identification tool for Azure and AWS, Threat Stack Cloud Security Platform extends security observability to AWS Fargate tasks, Polyrize announces its SaaS-based security platform, and more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw1932020-08-0640 minCYBERARKCYBERARKCYBERARK - "Il distanziamento sociale? Si può trasferire anche online"CYBERARK - "Il distanziamento sociale? Si può trasferire anche online"Contenuto sponsorizzatoIn questo podcast, realizzato con il supporto di Radio IT, Emilio Tonelli (sales engineer di CyberArk) ci parla di Risk Distancing. Come apprendiamo dalle sue parole, è una forma di traslazione dei principi del distanziamento sociale alla vita online, per distanziarsi dal rischio di attacchi malevoli ai propri sistemi. Emilio ci fa una panoramica sui rischi più frequenti di esposizione dei propri dispositivi all'azione del cybercrime, e soprattutto ci enuncia cinque regole di "distanziamento dal rischio" che andrebbero applicate - e pur...2020-07-1519 minCYBERARKCYBERARKCYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"Contenuto sponsorizzatoMassimo Carlotti, pre sale team leader di CyberArk, è di nuovo al microfono per un podcast realizzato con il supporto di Radio IT. Insieme a Igor, parla della "piaga tecnologica" più diffusa durante il lockdown (il phishing), di sicurezza perimetrale e dei suoi limiti, dell'impatto sulle critical app (quelle senza le quali il business dell'azienda di blocca).E poi parla dei CISO, i Chief Information Security Officer (o direttori della sicurezza informatica), e di come troppo spesso in azienda il lor...2020-06-1817 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)STELKS 6, CyberArk Alero, & CheckPoint CloudGuard - ESW #188BeyondTrust Announces Integration with the SailPoint Predictive Identity Platform, Check Point Launches CloudGuard Cloud Native Security, CyberArk Alero enhancements provide secure privileged access for remote users, Digital Shadows announces new capabilities to identify and remediate unwanted code exposure, and more!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode1882020-06-1731 minImpresaCityImpresaCityFase 2, lavoro da remoto e sicurezza il punto di vista di CyberArkIn questa fase di ripartenza, lo smart working sta assumendo tutti i connotati di una nuova normalità. Ma con quali impatti sulla sicurezza? Ne parliamo con Massimo Carlotti, Presales Team Leader di CyberArk2020-06-1007 minCYBERARKCYBERARKCYBERARK - Ransomware: veri e propri sequestri, da fermare in ogni modoCYBERARK - Ransomware: veri e propri sequestri, da fermare in ogni modoContenuto sponsorizzatoQuesto podcast, realizzato con il supporto di Radio IT, è dedicato ai ransomware, minaccia informatica tra le più diffuse e temibili. Si tratta di veri e propri sequestri di ciò che ci è particolarmente caro: i nostri dati. Per fermarli, come ci spiega Massimo Carlotti, si stanno studiando misure anti crimine che ricordano quelle prese negli anni Settanta contro i sequestri di persona.Massimo (pre-sale team leader di Cyberark) ci fa il punto sulla questione: quanto è diffusa e pericolosa, quali rimedi si stann...2020-05-1217 minCYBERARKCYBERARKCYBERARK - Robotic Process Automation (RPA), uno strumento prezioso da difendere con curaCYBERARK - Robotic Process Automation (RPA), uno strumento prezioso da difendere con curaContenuto sponsorizzatoEmilio Tonelli, sales engineer per CyberArk, ci racconta in questa intervista perché gli RPA sono strumenti molto preziosi per le aziende. Come tali, attraggono le cattive intenzioni dei cyber criminali: ecco perché vanno difesi con cura e attenzione.In questo podcast scopriamo con Emilio le loro caratteristiche e le soluzioni di CyberArk per una protezione di altissimo livello.Buon ascolto!Altri contenuti su www.radioit.it2020-04-2416 minCYBERARKCYBERARKCYBERARK - Le aziende non controllano gli accessi esterni? Ecco una soluzioneCYBERARK - Le aziende non controllano gli accessi esterni: ecco una soluzioneContenuto sponsorizzatoCiao. Torniamo a parlare di accessi privilegiati e lo facciamo con Massimo Carlotti, sales engineer di CyberArk. Il tema è cruciale per la cybersecurity aziendale. Molte aziende, come è noto a molti, oggi si affidano a terze parti, di solito organizzazioni di servizi esterne, per gestire una parte della propria infrastruttura IT. Per svolgere il proprio lavoro al meglio, queste organizzazioni hanno bisogno di un accesso privilegiato che consenta loro di accedere ai sistemi IT aziendali.Questo metodo è il più diffuso; tutt...2020-01-2713 minCYBERARKCYBERARKCYBERARK - Ma un hacker, quando attacca, quale bersaglio preferisce?RADIO IT | CYBERARKContenuto sponsorizzatoNel podcast di oggi, realizzato con la collaborazione di CyberArk, raccontiamo quali sono i bersagli preferiti dagli hacker quando attaccano un'azienda o un'organizzazione. Quel bersaglio sono gli accessi privilegiati, dai quali passa l'80% delle intrusioni del cybercrime nelle aziende. In questo podcast spieghiamo perché, per almeno cinque buone ragioni, essi devono avere priorità nelle strategie di difesa contro gli hacker.Ragioni semplici, in alcuni casi intuitive, ma che sono troppo spesso trascurate.Buon ascolto!Altri contenuti su www.radioit.it2019-12-1607 minCYBERARKCYBERARKCYBERARK - Furto di identità, il crimine più facile da commettereRADIO IT | CYBERARKContenuto sponsorizzatoIl podcast che stai ascoltando è realizzato in collaborazione con Cyberark, ed è utile per capire cosa sia un accesso privilegiato e perché le aziende - ma non solo: tutti noi - debbano starci davvero attenti. Partiamo da un problema piuttosto diffuso: il furto di identità. Tra i cybercrime è il più facile da commettere, e il più diffuso. E non serve che ti rubino la password: basta che si conosca il tuo numero di telefono per poter fare, a tuo nome, parecchi guai.Quali? E come si può evitarli? Nel podcast...2019-12-0507 minMad Money w/ Jim CramerMad Money w/ Jim CramerCyberArk CEO, eHealth CEO, and Off The Charts VIX CheckThe Dow fell 268 points today and Jim Cramer is digging into the cause of Wall Street’s volatile day. Then, it’s CyberArk Monday in the Mad Money studio, and Udi Mokady, the co-founder, chairman and CEO sits down with Cramer to talk about the future of cyber security and whether this software stock can keep climbing. And, eHealth’s CEO Scott Flanders is here to discuss what his company is all about and its recent red-hot run. Plus, Cramer’s going Off The Charts to dig into the VIX and see if investors should be worried about a turn from bul...2019-12-0348 minMad Money w/ Jim CramerMad Money w/ Jim CramerCyberArk CEO, eHealth CEO, and Off The Charts VIX CheckThe Dow fell 268 points today and Jim Cramer is digging into the cause of Wall Street’s volatile day. Then, it’s CyberArk Monday in the Mad Money studio, and Udi Mokady, the co-founder, chairman and CEO sits down with Cramer to talk about the future of cyber security and whether this software stock can keep climbing. And, eHealth’s CEO Scott Flanders is here to discuss what his company is all about and its recent red-hot run. Plus, Cramer’s going Off The Charts to dig into the VIX and see if investors should be worried about a turn from bul...2019-12-0350 minMad Money w/ Jim CramerMad Money w/ Jim CramerCyberArk CEO, eHealth CEO, and Off The Charts VIX CheckThe Dow fell 268 points today and Jim Cramer is digging into the cause of Wall Street’s volatile day. Then, it’s CyberArk Monday in the Mad Money studio, and Udi Mokady, the co-founder, chairman and CEO sits down with Cramer to talk about the future of cyber security and whether this software stock can keep climbing. And, eHealth’s CEO Scott Flanders is here to discuss what his company is all about and its recent red-hot run. Plus, Cramer’s going Off The Charts to dig into the VIX and see if investors should be worried about a turn from bul...2019-12-0349 minThe TECHunplugged PodcastThe TECHunplugged PodcastEP26 – CyberArk – Adversary Simulation: The Red Team Is Your Friend – with Shay NahariIn this 26th episode of the TECHunplugged Podcast we welcome Shay Nahari, Head of Red Team Services at CyberArk. This episode was recorded live at CyberArk Impact in Amsterdam, in May 2019. Podcast co-hosts Max Mortillaro (@darkkavenger) and Arjan Timmerman (@arjantim) talk with Shay about the CyberArk Red Team activities, adversary simulation services, identifying critical … Continue reading EP26 – CyberArk – Adversary Simulation: The Red Team Is Your Friend – with Shay Nahari →2019-06-2700 minTechnado (Archived)Technado (Archived)The Technado, Episode 85: CyberArk’s Joe GarciaJoe Garcia from CyberArk was kind enough to come all the way up from Tampa to join Peter and Don in the studio to talk about Conjur and all the other cool things happening at CyberArk. The three also discussed the week’s news, including who is listening in on your private conversations this week, a chromium ultimatum, and a beefy new Intel processor.2019-02-0100 minApplication Security Weekly (Video)Application Security Weekly (Video)Brian Kelly, CyberArk - Application Security Weekly #39Brian Kelly is Head of Conjur Engineering at CyberArk, where he focuses on creating products that add much-needed security and identity management to the landscape of DevOps tools and cloud systems. Full Show Notes: https://wiki.securityweekly.com/ASW_Episode39 To learn more about Conjur, go to: www.conjur.org/asw Follow us on Twitter: https://www.twitter.com/securityweekly2018-11-1429 minPaul\'s Security Weekly (Video)Paul's Security Weekly (Video)John Walsh, CyberArk - Paul's Security Weekly #579John Walsh the DevOps Evangelist for CyberArk joins us on the show. John talks about the articles he wrote for CyberArk about Kubernetes, DevSecOps, and how to strengthen your container authentication with CyberArk. Sponsor Landing Page: https://www.conjur.org/asw Full Show Notes: https://wiki.securityweekly.com/Episode579 Follow us on Twitter: https://www.twitter.com/securityweekly2018-10-2139 minApplication Security Weekly (Video)Application Security Weekly (Video)Joe Garcia, CyberArk - Application Security Weekly #25As a Global Corporate Solutions Engineer, Joe Garcia has a strong background in DevOps, Cloud and Security and is currently focused on helping customers implement and scale effective secrets management solutions. He was previously a Solutions Architect with the CyberArk Customer Success team for the West and Southeast regions. Full Show Note: https://wiki.securityweekly.com/ASW_Episode25 Follow us on Twitter: https://www.twitter.com/securityweekly2018-07-2436 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Duo, CyberArk, & Demisto - Enterprise Security Weekly #97This week, Duo integrates with Sophos to address BYOD Security, SkyHigh not the limit of McAfee's ambition; IPO an option, CyberArk's new offering to mitigate privileged access risk, Ping Identity acquires Elastic Beam for AI-Powered API Security, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode97 Visit http://securityweekly.com/esw for all the latest episodes!2018-06-2920 minInsider ResearchInsider ResearchEIC 2018: Interview mit CyberArk: Neue Chancen im Identity-GeschäftAuf der EIC (European Identity & Cloud Conference) 2018 in München traf Oliver Schonschek (Insider Research) Michael Kleist, Regional Director DACH bei CyberArk. Themen des Interviews waren:Was hat es mit den neuen Angeboten für Managed Security Service Providers auf sich? Welche Partner sucht CyberArk dafür? Und was bietet der neue Marketplace von CyberArk?Das Interview zu den neuen Partner-Angeboten von CyberArk gibt es in dieser Podcast-Folge. Den vollständigen Rückblick auf die EIC 2018 finden Sie bald bei IT-BUSINESS.de2018-05-1604 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Rapid7, CyberArk, & Tenable - Enterprise Security Weekly #83In the news, CyberArk buy Vaultive to enrich cloud security solutions, Tenable expands its research team, Rapid7 announces pricing of public offering, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode83 Visit https://www.securityweekly.com/esw for all the latest episodes! 2018-03-1524 minBusiness Security Weekly (Video)Business Security Weekly (Video)Elizabeth Lawler, CyberArk - Startup Security Weekly #58Elizabeth Lawler is the Vice President of DevOps Security at CyberArk. She co-founded Conjur, a devops security company, in 2011; it was acquired by CyberArk in May 2017. Elizabeth joins us for an awesome devops-charged interview! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode58 Visit http://securityweekly.com/category/ssw for all the latest episodes!2017-10-0944 min