News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The growing number of machine identities is becoming a problem
The rapidly growing number of machine identities is becoming a problem

Most German companies have significantly more machine identities than human identities, and this gap will widen further in the coming months. However, companies are struggling to protect machine identities – more than a third already have trouble maintaining an overview. This leads to delays in the deployment of new applications, compliance violations, and IT disruptions that negatively impact customer relationships, according to CyberArk's 2025 State of Machine Identity Security Report. Certificates, keys, secrets, machine identities, including certificates,...

Read more

Identity Convergence, Private GPTs and AI Attacks
Identity Convergence, Private GPTs and AI Attacks

In 2024, IT was shaped by numerous innovations in AI and large language models, for example. New attack vectors such as AI model jailbreaking or prompt hacking have also emerged. CyberArk takes a look at the trends of 2025. 2025 will again bring a number of new developments, challenges and opportunities in IT and cybersecurity. CyberArk sees three areas in particular that companies should keep an eye on: the convergence of physical and digital identity, the introduction of private AI models and AI-driven cyberattacks. Convergence of physical and digital identity Nowadays…

Read more

Security risks due to employee behavior
B2B Cyber ​​Security ShortNews

A new study shows that companies must not only manage employee data access, but also secure it. The reason: Many common behaviors of employees when accessing sensitive and privileged data lead - consciously or unconsciously - to security risks. The CyberArk study is based on a global survey of 14.003 employees and provides insights into common behaviors and data access patterns. It shows that security teams should rethink the application of identity security controls. The four key security risks at a glance: The majority have access to confidential information: 86% of respondents...

Read more

Zero-Standing Privileges: Distinguishing Myth from Truth
Zero-Standing Privileges: Distinguishing Myth from Truth

What can the Zero Standing Privileges (ZSP) principle do and what is a myth? ZSP is an important component in identity security. However, its capabilities are often overestimated. Companies always need a comprehensive range of controls to adequately secure their complex hybrid and multi-cloud environments. When it comes to zero standing privileges, there are some myths to be aware of and some realities that are crucial to building a forward-looking Privileged Access Management (PAM) program. Knowing these myths and realities is important for companies to make informed decisions and implement effective security measures. CyberArk lists three of the most common...

Read more

Identity Security Platform: reliably protect identities
Identity Security Platform: reliably protect identities

CyberArk's AI-based Identity Security Platform has received new features and improvements to help organizations enforce authorization controls appropriate for each identity. With 93 percent1 of organizations experiencing two or more identity-related security breaches in the past year, it's more important than ever to reliably protect all identities. However, this is made more difficult by the fact that each type of identity brings its own unique risks, requirements and challenges. The CyberArk Identity Security Platform is optimized for the unique needs of all identities, including regular users, IT staff, developers...

Read more

The number of identity-related attacks is increasing
The number of identity-related attacks is increasing

The "CyberArk 2024 Identity Security Threat Landscape Report" shows that the increasing number of human and non-human identities increases the risk of cyber attacks. The study also addresses the increasing importance of artificial intelligence, which on the one hand improves cyber defense, but on the other hand opens up new opportunities for attackers. Almost every company has more and more human and, above all, non-human identities. The security officers of the companies surveyed in Germany rate non-human identities (often known as "technical accounts") as the riskiest type of identity. The reasons for this are the widespread implementation...

Read more

Protect identities with intelligent authorization controls
Protect identities with intelligent authorization controls

The number of human and non-human identities in organizations is growing rapidly, and sooner or later each of these identities will need access to critical resources. This makes them extremely attractive to cybercriminals. The days when only a few administrators had extensive permissions in company IT infrastructures are long gone. Most employees, applications and devices now also require such rights in order to access critical resources that they need in their everyday work. The classic definition of privileged identities therefore no longer applies, because ultimately every identity can be privileged and requires…

Read more

Password-free security
Password-free security

Passwords represent a high security risk for companies. Through password theft, attackers can often penetrate company systems unnoticed and cause a lot of damage. Passwordless authentication is therefore trending. CyberArk shows what companies should pay attention to during implementation, especially with regard to the IAM solution used. Everyone knows it: Creating a new password is an annoying process because, for example, it has to be at least eight characters long and contain upper and lower case letters, numbers and special characters. But it's a necessary evil since passwords are still one of the most popular targets for attackers...

Read more

Passwordless authentication with passkeys
Passwordless authentication with passkeys

An identity security company is expanding passwordless authentication capabilities in CyberArk Identity. Passkey support helps companies prevent credential theft and increase productivity by enabling easy access to applications and websites using strong authentication methods such as biometrics. Most security breaches start with the theft or misuse of credentials. With passkeys support in CyberArk Identity, organizations can advance their passwordless authentication strategies to reduce this risk and prevent credential theft. Passkeys are a phishing-proof and FIDO2 compliant…

Read more

Companies use insecure password procedures
B2B Cyber ​​Security ShortNews

At 61%, significantly more than half of the German companies surveyed still use insecure practices when managing and using passwords. This is proven by the “2023 Identity Security Threat Landscape” study. This is a key finding of the global study “2023 Identity Security Threat Landscape” by CyberArk. High-profile cyberattacks in which stolen employee logins are used to break into company IT systems are commonplace. The dangers are known and yet, according to the current CyberArk study “Identity Security Threat Landscape”, which provides a global inventory of cybersecurity, 61%…

Read more