POPULARITY
In the latest episode of Facts vs Feelings, Ryan Detrick, Chief Market Strategist, and Sonu Varghese, VP, Global Macro Strategist, welcome tech analyst Dan Ives, Managing Director at Wedbush, to discuss the state of AI, the future of autonomous technologies, China-U.S. relations in tech, and investment opportunities beyond the usual headlines.Broadcasting from Carson's 2025 Spring Partner Summit in Omaha, this conversation blends covers everything from Tesla and Palantir to Microsoft's AI momentum and more.Key TakeawaysTesla Is Not Just a Car Company: Dan emphasized that Tesla should be valued as a disruptive AI and robotics company, not merely an automaker. Autonomous robotics are seen as a core driver of its future valuation.AI Party Is Just Getting Started: We're still in the early innings of the AI revolution—around “10:30 p.m.” on an all-night timeline, according to Dan. He likens skeptics to party-poopers who will wish they had joined once the sun comes up.China Cannot Be Decoupled: Efforts to cut ties with China in tech manufacturing are unrealistic, says Dan. The U.S. relies heavily on Chinese infrastructure, and disrupting this would have broad economic consequences.Apple as the AI Highway: While Apple may have lagged in AI innovation early on, Dan believes it will become the dominant platform for consumer AI applications thanks to its vast device ecosystem and installed base.Microsoft's Untapped AI Monetization: Despite a recent lull in stock performance, Dan sees Microsoft as massively underappreciated in its AI capabilities, especially within its enterprise customer base.Google (Alphabet) Is Underloved: Alphabet is currently the most underestimated of the “Magnificent Seven” tech stocks, particularly due to overstated concerns about search being disrupted by AI.Palantir's Long-Term Role: Dan projects Palantir as a trillion-dollar company in the making, thanks to its growing role in enterprise and sovereign AI applications.AI Stocks Beyond the Headlines: Emerging names like Pegasystems, SoundHound, Veronis, and CyberArk are cited as under-the-radar plays in the AI boom, especially in areas like cybersecurity and data infrastructure.Autonomous + Robotics = Game Changer: Dan envisions a near-future where humanoid robots under $20,000 become household norms—transforming labor, transportation, and daily life.Bitcoin's Role in Tech: Bitcoin's institutional adoption is growing, and Dan sees it as a risk-on asset with increasing relevance, especially in a deregulated environment. Connect with Ryan:• LinkedIn: Ryan Detrick• X: @ryandetrick Connect with Sonu:• LinkedIn: Sonu Varghese• X: @sonusvarghese Connect with Dan:• LinkedIn: Daniel Ives• X: @DivesTech Questions about the show? We'd love to hear from you! factsvsfeelings@carsongroup.com#FactsVsFeelings #DanIves #AIRevolution #TeslaAI #MicrosoftAI #TechInvesting #AutonomousFuture #InnovationEconomy #NVIDIA #Palantir #CryptoAndTech #ChinaUSRelations #BigTech #FutureOfWork #CarsonPartners #FinancialPodcast
In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk's head of ANZ operations, to explore the company's international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberArk's international operations and recent trends regarding how businesses are looking at their networks and what's essential to keep their operations running smoothly. The pair then discuss the importance of understanding and implementing privileged access to data and how that can keep critical infrastructure secure. Fikentscher talks about the recent blackouts in Spain and the challenges of introducing AI agents into workflows. Fikentscher discusses why modern privileged access management (PAM) must extend beyond traditional admin controls as organisations scale across cloud and AI environments. He explains it now needs to secure both human and machine identities, manage ephemeral access and integrate seamlessly into DevOps workflows. Finally, he emphasises the importance of a ‘security by design' approach - embedding security into the architecture of systems and processes from the start to strengthen resilience and compliance, but also to help prevent security lapses that can disrupt business operations and impact bottom lines. Enjoy the episode, The Cyber Uncut team
Ce vendredi x mois année, Liste INVITES et FONCTiON, se sont penchés sur les titres (....à lister... ), dans On achète ou on vend ? dans l'émission C'est Votre Argent présentée par Marc Fiorentino. C'est Votre Argent est à voir ou écouter le vendredi sur B
This week, we are joined by Shaked Reiner, Security Principal Security Researcher at CyberArk, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check. The research can be found here: Agents Under Attack: Threat Modeling Agentic AI Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.
Machine identities, unique digital credentials, like digital certificates or keys, are becoming increasingly important as organisations accelerate digital transformation, adopt cloud services, and integrate automation. They are Yet, more often than not, they are poorly managed and dangerously exposed. According to global identity security firm CyberArk, over three-quarters of Asia Pacific security leaders have reported incidents linked to compromised machine identities. As enterprises scale their digital operations, how can they safeguard the growing network of bots, APIs, and AI agents interacting behind the scenes? Ssu Han Koh, Solutions Engineering Director for ASEAN, CyberArk, shares insights into the evolving threat landscape and why it is time companies give machines a seat at the identity table. See omnystudio.com/listener for privacy information.
Send us a textIdentity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing identification and authentication systems that protect your most valuable assets.Starting with a timely examination of the risks involved in the proposed rapid rewrite of the Social Security Administration's 60-million-line COBOL codebase, we explore why rushing critical identity systems can lead to catastrophic failures. This real-world example sets the stage for understanding why proper authentication management matters.The episode walks through the essential differences between centralized and decentralized identity approaches, explaining when each makes sense for your organization. We break down Single Sign-On implementation, multi-factor authentication best practices, and the often overlooked importance of treating Active Directory as the security tool it truly is—not just an open database for anyone to query.For security practitioners looking to level up their authentication strategy, we examine credential management systems like CyberArk, Just-in-Time access models, and federated identity frameworks including SAML, OAuth 2.0, and OpenID Connect. Each approach is explained with practical implementation considerations and security implications.Whether you're studying for the CISSP exam or working to strengthen your organization's security posture, this episode provides actionable insights on establishing robust authentication controls without sacrificing usability. Don't miss these essential strategies that form the foundation of your security architecture.Ready to master CISSP Domain 5.2 and all other CISSP domains? Visit CISSPCyberTraining.com for structured learning materials designed to help you pass the exam the first time.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
In this episode of Topline, we sit down with Ryan Burke, VP of Sales at CyberArk (former VP of Sales at Zilla Security), to dive deep into the $175 million acquisition of Zilla. Ryan shares what it's really like to navigate an exit in today's market—from the unexpected nature of M&A deals to the grueling due diligence process and the tough decisions that founders and executives face. We also explore the evolving cybersecurity landscape, why big platforms are scooping up smaller companies earlier, and how AI is both a threat and an opportunity in the industry. Plus, we discuss the power of trusted networks in sales, whether the "Rolodex hire" is making a comeback, and how partnerships are shaping go-to-market strategies. Thanks for tuning in! Want more content from Pavilion? New episodes of Topline drop every Sunday with new Topline Spotlight mini-episodes every Thursday. Subscribe to never miss an episode. Stay ahead with the latest industry developments, emerging go-to-market trends, and valuable benchmarking data. Subscribe to Topline Newsletter for GTM insights from Asad Zaman every Thursday. Tune into The Revenue Leadership Podcast with Kyle Norton every Wednesday. He dives deep into the strategies and tactics that drive success as a revenue leader, featuring real operators like Jason Lemkins of SaaStr, Stevie Case of Vanta, and Ron Gabrisko of Databricks. Your're invited! Join the free Topline Slack channel to connect with 600+ revenue leaders, share insights, and keep the conversation going beyond the podcast! Key Chapters: (00:00) - The Exciting Exit of Zilla Security (07:40) - Navigating the Acquisition Process (16:19) - The Impact of Market Conditions on Startups (25:04) - Sales Team Dynamics During Transitions (32:32) - Trends in Cybersecurity and AI's Role (35:20) - Navigating Cybersecurity Challenges (38:38) - Mergers and Acquisitions in Cybersecurity (40:32) - The Impact of AI on Cybersecurity (43:14) - The Role of Trusted Networks in Sales (49:06) - Innovative Partnerships and Their Importance (01:00:01) - Effective Communication in Professional Settings
Information security company CyberArk has acquired identity access and governance platform Zilla Security in a deal worth up to $175 million. Founded in 1999, Boston-based CyberArk specializes in access management, including privileged access security which helps organizations protect sensitive data and critical infrastructure from external (and internal) threats. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Willkommen zu einer neuen Episode von Expanding Utilities. In dieser Folge dreht sich alles um das Thema Identitätssicherheit in der Energiewirtschaft, ein Bereich, der zunehmende Bedeutung gewinnt. Zu Gast haben wir Michael Kleist, einem Experten von CyberArk, der die Besonderheiten und Herausforderungen kennt, mit denen sich Unternehmen in der Energiebranche konfrontiert sehen. Gemeinsam sprechen wir über Identity Security, der Schutz privilegierter Zugriffe und die Rolle von Plattformstrategien bei der Cybersicherheit. Hört rein und erfahrt mehr darüber, wie IT- und OT-Umgebungen sicherer gestaltet werden können und welche Trends die Branche in Zukunft prägen könnten. Viel Spaß beim Zuhören!
Welcome to Security Matters, the next evolution of CyberArk's podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security.Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Matters refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.Join Security Matters to explore why how you approach security truly matters.Coming mid-Feb. 2025 to this stream and most major podcast platforms.
In diesem Podcast nehmen wir die beiden führenden Cybersecurity-Unternehmen Secunet Security Networks und CyberArk Software unter die Lupe. Beide Firmen sind im Bereich des Zugriffsmanagements tätig, verfolgen jedoch unterschiedliche Strategien und Zielmärkte. Während Secunet stark auf den öffentlichen Sektor in Deutschland und Europa fokussiert ist – mit Behörden, Verteidigungsministerien und dem Gesundheitswesen als Kunden – konzentriert sich CyberArk auf internationale Unternehmen und bietet umfassende Lösungen für den privaten Sektor. Wir vergleichen die Geschäftsmodelle, Wachstumsperspektiven und finanziellen Kennzahlen beider Unternehmen und beleuchten, welche Aktie langfristig mehr Potenzial bietet. Wie schlagen sich die Unternehmen in den Bereichen Umsatzwachstum, Profitabilität und Marktstellung? Welche strategischen Weichenstellungen könnten in den kommenden Jahren entscheidend sein? Themen im Überblick:• Geschäftsmodell und Marktstrategie: Öffentlicher Sektor vs. internationaler Privatsektor• Umsatzentwicklung und Gewinnwachstum im Vergleich• Bewertung und fundamentale Kennzahlen im Detail• Chancen und Risiken für langfristige Investoren Die Cybersecurity-Branche boomt weiterhin, und der Schutz sensibler Daten wird für Unternehmen und Institutionen immer wichtiger. Doch welche Aktie ist aktuell die attraktivere Wahl? Finde es in unserer detaillierten Analyse heraus. Inhaltsverzeichnis00:00 Intro00:57 Langfristige Charts: Secunet vs. CyberArk02:27 Secunet & CyberArk vs. S&P 500 Technologie ETF (XLK) vs. S&P 500 vs. iShares Cyber Security ETF03:03 Secunet & CyberArk vs. Fortinet vs. Palo Alto vs. Crowdstrike03:36 Secunet: Geschäftsmodell07:31 CyberArk: Geschäftsmodell09:23 Burggraben: Secunet vs. CyberArk12:05 Inhaberschaft & CEOs: Secunet & CyberArk13:59 Umsatz & Margen Entwicklung15:51 Umsatz nach Region & Segment17:09 Gewinn, Cashflow & Dividenden-Entwicklung20:18 Bilanz-Überblick21:12 Aktienrückkäufe & Dividenden22:54 Kennzahlen-Überblick (KGV)23:47 Unternehmensbewertung: Secunet24:47 Unternehmensbewertung: CyberArk25:26 Chartanalyse: Secunet28:03 Chartanalyse: CyberArk30:07 Disclaimer30:55 Danke fürs Einschalten! Zusammenarbeit anfragenhttps://www.maximilian-gamperling.de/termin/ Social Media- Instagram: https://www.instagram.com/maximilian_gamperling/- LinkedIn: https://www.linkedin.com/in/gamperling/- Newsletter: https://www.maximilian-gamperling.de/newsletter- Podcast: https://akademie.maximilian-gamperling.de/podcasts/anker-aktien-podcast Meine Tools- Charts*: https://de.tradingview.com/?aff_id=117182- Aktienfinder: https://aktienfinder.net- Finchat.io*: https://finchat.io/?via=maximilian- TransparentShare: https://bit.ly/3laA6tK- SeekingAlpha*: https://www.sahg6dtr.com/QHJ7RM/R74QP/- Captrader*: https://www.financeads.net/tc.php?t=41972C46922130T DisclaimerAlle Informationen beruhen auf Quellen, die wir für glaubwürdig halten. Trotz sorgfältiger Bearbeitung können wir für die Richtigkeit der Angaben und Kurse keine Gewähr übernehmen. Alle enthaltenen Meinungen und Informationen dienen ausschließlich der Information und begründen kein Haftungsobligo. Regressinanspruchnahme, sowohl direkt, wie auch indirekt und Gewährleistung wird daher ausgeschlossen. Alle enthaltenen Meinungen und Informationen sollen nicht als Aufforderung verstanden werden, ein Geschäft oder eine Transaktion einzugehen. Auch stellen die vorgestellten Strategien keinesfalls einen Aufruf zur Nachbildung, auch nicht stillschweigend, dar. Vor jedem Geschäft bzw. vor jeder Transaktion sollte geprüft werden, ob sie im Hinblick auf die persönlichen und wirtschaftlichen Verhältnisse geeignet ist. Wir weisen ausdrücklich noch einmal darauf hin, dass der Handel mit Aktien, ETFs, Fonds, Optionen, Futures etc. mit grundsätzlichen Risiken verbunden ist und der Totalverlust des eingesetzten Kapitals nicht ausgeschlossen werden kann.Aussagen über zu erwartende Entwicklungen an Finanzmärkten, insbesondere Wertpapiermärkten und Warenterminbörsen, stellen NIEMALS EINE AUFFORDERUNG ZUM KAUF ODER VERKAUF VON FINANZINSTRUMENTEN dar, sondern dienen lediglich der allgemeinen Information. Dies ist selbst dann der Fall, wenn Beiträge bei wörtlicher Auslegung als Aufforderung zur Durchführung von Transaktionen im o.g. Sinne verstanden werden könnten. Jegliche Regressinanspruchnahme wird insoweit ausgeschlossen. *Affiliate-Link #Duell #Aktien #Börse
In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk's Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, "The US Treasury Attack: Key Events and Security Implications."
Alissa Coram and Ed Carson analyze Tuesday's market action and discuss key stocks to watch on Stock Market Today.
This illuminating conversation with CyberArk's SVP of Finance, Nili Serr-Reuven, reveals how the 25-year-old cybersecurity leader successfully transformed from a traditional software company to a SaaS business model in just five quarters - far faster than the industry standard of 2-2.5 years - while maintaining strong margins and customer trust throughout the transition.Topics Include:Introduction to SaaS transformation challenges and opportunities.Tomaz Perc introduces Nili Serr Reuven from CyberArk.Overview of CyberArk's 25-year history and milestones.Transition from a perpetual model to SaaS.CyberArk's accelerated transformation in just five quarters.Challenges of shifting from product-centric to customer-centric.Importance of market research and peer consultations.Key role of cross-functional collaboration in success.Explanation of "swallowing the fish" in SaaS.Managing short-term revenue drops during SaaS transformation.CyberArk's 70% SaaS revenue share post-transformation.Impact of global economic challenges on business strategy.CyberArk's robust demand for identity security solutions.Strategic leadership's role in transformation execution.CyberArk's disciplined financial planning during uncertainty.Establishing KPIs like ARR and customer satisfaction.Managing rising cloud costs with FinOps practices.CyberArk's approach to pricing and packaging SaaS solutions.Leveraging acquisitions to speed up SaaS capabilities.Impact of transformation on CyberArk's finance department.Evolution of finance roles to support SaaS growth.Communication with investors during transformative periods.The importance of cultural shifts in transformation success.Continuous learning, transparency, and collaboration as cornerstones.Advice for future SaaS leaders: plan, communicate, adapt.Participants:Nili Serr Reuven – SVP Corporate Finance, CyberArkTomaz Perc – SaaS Business Lead, Amazon Web ServicesSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/
Send us a textCould the lack of hardware and firmware knowledge be the Achilles' heel of today's cybersecurity efforts? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we unpack the critical challenges faced by IT and security leaders, particularly in hardware-intensive sectors like manufacturing. We expose the concerning gaps in understanding that are leaving organizations vulnerable, and propose actionable solutions like fostering stronger collaboration between IT teams, security personnel, and suppliers. Tackling the prevalent issue of BIOS password sharing, we recommend secure password management tools, like CyberArk, and advocate for a shift from the culture of replacing devices to one of repair and repurposing, all while ensuring data is securely erased to prevent breaches.Shifting focus to authentication and password security, this episode dives into the essentials of Role-Based Access Control (RBAC), two-factor authentication, and the power of identity federation with protocols like SAML or OAuth. We dissect the benefits of Single Sign-On (SSO) for seamless multi-application access, while highlighting the necessity of identity proofing during onboarding. Finally, we take a hard look at common password pitfalls, stressing the importance of robust security practices. Our mission? To empower listeners with the knowledge and resources they need to bolster their cybersecurity measures—visit CISSP Cyber Training and ReduceCyberRisk.com for a deeper dive into fortifying your defenses.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
We speak with Venafi's Chief Innovation Officer, Kevin Bocek following the acquisition by Cyberark, effective as 1 October, 2024.Given Kevin's role over a decade with Venafi, he gives insight into what the acquisition of Venafi means for the customers of both companies and the market.We also discuss how the IAMs compliment each other and reflect the preference of customers to reduce the number of vendors, as well as responding to the state of play in terms of companies securing machine identities, and reflecting on the last 10 years how this will develop over the short to medium term.We also consider the emergence of Quantum and recent news that scientists have cracked a shortened RSA encryption.Recorded at Impact World Tour in Sydney, an identity security event, where, importantly Kevin has a key message for customers in APAC and Australia.#mysecuritytv #venafi #cyberark #impact2024 #iam #pam #identitysecurity
In this episode, we're joined by Tammy Klotz, a 3x CISO in the manufacturing industry, to explore identity security challenges in manufacturing environments. Tammy discusses the differences in access management for frontline workers versus knowledge workers, touching on the unique devices and role-based training requirements. Tune in to learn how tailored security solutions are key to managing access across diverse user groups in industrial settings. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-202
In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James explains the differences between misinformation, disinformation and malinformation and their roles in the information environment surrounding elections.He also highlights the importance of public-private partnerships in securing election infrastructure and the role of international collaboration in countering nation-state threats. The episode examines the challenges of maintaining trust in the digital age and the potential of identity verification technologies to enhance information trustworthiness.Finally, the discussion touches on the parallels between election security and enterprise cybersecurity, emphasizing the need for critical thinking and proactive measures to uphold the integrity of both elections and organizational security.For more insights from James Imanian on election security, check out his blog, "Six Key Measures for Upholding Election Security and Integrity."
In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle's largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insights on the unique challenges of securing a remote workforce in the banking sector and underscores the importance of a robust identity security framework in protecting both members and employees in today's evolving threat landscape. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-201
Let's talk about what CISOs look for when hiring identity and access management team members. What training and experience is most attractive for the business and team. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-200
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-199
In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker," which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.
In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines. In today's threat landscape, the number and types of identities, attack methods and environments have dramatically increased, making it more challenging to secure identities. Jeff discusses the challenges and efforts in creating sustainable, interoperable digital identity hubs for cross-border applications, the future of digital passports and the importance of encryption and multi-factor authentication (MFA) for securing sensitive data. The conversation also highlights the significance of thought leadership and maintaining a vendor-agnostic approach in identity security.
Ever thought about how much of your life is protected by passwords? And why do hackers want to steal credentials? How do they do it and more importantly, how can we stop them in their tracks?From your emails to your retirement savings, passwords are quite literally the gatekeepers to your online life. And there are layers to password security, from your own password to the passwords that companies use to protect the collective data. Hackers are constantly using different tricks to try to crack those codes to access as much information as possible.In this episode, we'll get into the how's and why's to help you stay strong against cyber threats with the help of our guests; David Higgins, Field CTO at CyberArk and Tom Wheeler, Specialist Sales Manager for Networking and Security at Softcat.If you want to listen to more episodes from this season, new ones are released on the last Tuesday of every month. Alternatively, you can stream or download all episodes from every season on your preferred platform. Your host for this episode of Softcat's Explain IT podcast is Helen Gidney, Softcat's head of Architecture. Join us as we talk tech in simple jargon free language. Have you got a burning question for the team? Please send an email toHelenGi@softcat.comThis podcast is produced by The Podcast Coach. Hosted on Acast. See acast.com/privacy for more information.
The stock market rally sold off after the long holiday. The S&P 500, in a new power trend and on the cusp of a new high, retreated to its 21-day line. The Nasdaq tumbled below its 50-day and 21-day lines, with Nvidia selling off. Freshpet moved back into a buy zone, but slashed gains. CyberArk fell, but held up relatively well.
Len Noe, a professional ethical hacker, is a technical evangelist for CyberArk. Living with 10 microchips implanted in his body, Noe calls himself a "transhuman," and is hacking his body for security research. In this episode, he joins host Charlie Osborne to discuss his experience in detail, including what implants he has experimented with, how they can be used to conduct cyberattacks, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
A new survey on potential cybersecurity threats across the landscape and how companies are responding to them suggests many challenges ahead and grim outlooks. Keith chats with Brandon Traffansted, field CTO at CyberArk, about what the survey results mean, and whether there is hope for optimism across the ransomware, machine identity, generative AI and threat landscapes.
In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk's Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI Center of Excellence and the introduction of CyberArk CORA AI, an umbrella of AI capabilities infused within CyberArk's products.Join us as we examine the challenges and opportunities presented by AI in the cybersecurity landscape, the importance of fostering a culture of innovation and how CyberArk is leading the charge in securing identities in the AI era. This episode is a must-listen for anyone interested in the intersection of AI and identity security – and the future of cyber protection.
The Nasdaq composite jumped 1.2% and marked its sixth straight all-time closing high. But breadth was so-so, with winners beating losers by less than 2-to-1 as software and restaurant stocks lagged again. Newmont and Ensign gave buy signals while CyberArk is setting up.
Global startup funding rose to $79 billion in Q2, a 16% increase from the previous quarter and a 12% rise from Q2 2023. AI investments played a significant role, contributing $24 billion or 30% of the total. Larger M&A deals also increased, enhancing liquidity in venture capital markets. Despite fluctuations, funding trends for pre-IPO companies and AI sectors remained strong, with major rounds going to companies like Elon Musk's xAI and CoreWeave. Healthcare and biotech raised $17 billion, with hardware companies securing $11 billion due to AI infrastructure needs. Seed funding remained stable at $8 billion per quarter over the last five quarters. Notable M&A deals included CyberArk's $1.5 billion bid for Venafi and Nvidia's $700 million acquisition of Run:AI. Nonetheless, the market outlook remains cautious with ongoing concerns about revenue growth, challenging funding environments, and a slower exit environment.Learn more on this news visit us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.
In this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company's Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the methodical, data-driven approaches to monetization strategies and the significance of learning from on-the-job experiences. This episode is a must-listen for anyone interested in the intersection of AI and IAM, and the opportunities it presents for leading the transition in the industry. Tune in to uncover what's coming down the AI pike and how it will influence the future of IAM.For more from Daniel on this subject, check out his recent blog, "Predicting the Future of AI in Identity and Access Management."
Send us a Text Message.Want to ensure your organization's sensitive data remains secure in today's mobile-centric world? Tune in to our latest CISSP Cyber Training Podcast episode, where we unravel the complexities of federated identities and robust credential management. Learn from the high-profile data breach involving Change Healthcare and discover how multi-factor authentication could have prevented such a disaster. We promise you'll gain essential insights into how federated identities streamline authentication processes, making your digital life both secure and efficient.We'll also explore the pros and cons of centralized versus decentralized identity management, highlighting real-world examples like Google and Facebook authentication. Curious about just-in-time credentials? We explain how temporary, on-demand access can significantly reduce security risks, and examine top credential management systems like CyberArk, Keeper Security, and LastPass. To cap it all off, hear about our exciting new non-profit initiative supporting adoptive families. Don't miss out on this comprehensive guide to mastering domain 5, section 5.3 of the CISSP curriculum!Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Chip Stock Investor dives deep into the Identity Access Management (IAM) sector of cybersecurity. We analyze key players like Microsoft (MSFT) Okta (OKTA) and CyberArk (CYBR), with a special focus on CyberArk's recent deals and acquisition. Learn the difference between IAM and Privileged Access Management (PAM), understand the significance of machine identity management, and get insights into CyberArk's financials, strategy, and future in the ever-evolving industry.
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss. A number of new product announcements continue to trickle out post-RSA. We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess. Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes! See the show notes for individual descriptions on each RSAC interview. This week, we feature speakers from Sailpoint, Okta, Ping Identity, LimaCharlie, QwietAI, and Picus! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-363
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss. A number of new product announcements continue to trickle out post-RSA. We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess. Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes! See the show notes for individual descriptions on each RSAC interview. This week, we feature speakers from Sailpoint, Okta, Ping Identity, LimaCharlie, QwietAI, and Picus! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-363
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss. A number of new product announcements continue to trickle out post-RSA. We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess. Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes! Show Notes: https://securityweekly.com/esw-363
CyberArk — one of the army of larger security companies founded out of Israel — is acquiring Venafi, a specialist in machine identity, for $1.54 billion. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Last week was a big one for AI news, and one thing that stood out to us was OpenAI's deal with Reddit. Per the terms of the deal, OpenAI will get to use content from Reddit like posts and replies to train its AI, and Reddit will get access to some unspecified AI tools. Reddit's stock soared 11% in extended trading following the news.That's not all we talked about on today's episode of Equity. This morning, Rebecca Bellan also walked us through a new social media platform called Maven that wants to do away with likes, followers and clout-chasing in favor of more serendipitous internet exploration. Maven was co-founded by OpenAI alum Kenneth Stanley and is backed by Twitter co-founder Ev Williams. Speaking of Twitter, X.com is officially live as a platform. Annoyingly for Elon Musk, so is Twitter.com.Bellan also covered some fresh cybersecurity consolidation. Israeli security firm CyberArk has purchased Venafi out from Thoma Bravo for $1.54 billion -- that's $1 billion in cash and the rest in shares.Before you go, don't miss the latest Pitch Deck Teardown from Haje Kamps. In today's segment Haje digs deep on Berlin-based startup Goodcarbon's deck. The startup just raised a €5.25 million (around $5.5 million) seed round to make its mark on the big business of carbon credits, and its pitch deck does a great job at showing traction, but is not so great its team slide. Listen to the end to learn more!Equity is TechCrunch's flagship podcast, produced by Theresa Loconsolo, and posts every Monday, Wednesday and Friday.Subscribe to us on Apple Podcasts, Overcast, Spotify and all the casts. You also can follow Equity on X and Threads at @EquityPod. For the full episode transcript, for those who prefer reading over listening, check out our full archive of episodes over at Simplecast. Credits: Equity is produced by Theresa Loconsolo with editing by Kell. Bryce Durbin is our Illustrator. We'd also like to thank the audience development team and Henry Pickavet, who manages TechCrunch audio products.
In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company's 25th anniversary. They discuss that milestone and reflect on CyberArk's growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he has learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. And, because we say in the episode that we'll share it here, Mark Knopfler's new album is entitled ‘One Deep River' … Udi describes it as great for driving and optimistic. Enjoy the podcast!
In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the Cyber Cognition podcast (along with CyberArk's resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the role of identity in threat monitoring and detection, and the challenges and opportunities AI presents organizations in defending against evolving threats and how we can harness its power for the greater good. Tune in to learn more about the fascinating and ever-changing landscape of adversarial AI and identity security.
Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That's a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems.CyberArk is a Red Hat partner.
En este episodio de Value Investing FM, Adrián y Paco tenemos el placer de entrevistar de nuevo y por cuarta vez a Flavio y Juande de Andrómeda. Nos hablarán sobre cómo han vivido este último año y cómo ven la situación actual. Y haremos un repaso de sus tesis de inversión: Semiconductores y AI: Nvidia vs AMD Actualización Picos y Palas virutales: SnowFlake, MongoDB, GitLab, Adyen, Datadog, Unity, HashiCorp Actualización Ciberseguridad: Zscaler, SentinelOne, Crowdstrike, Cloudflare, Palo Alto Networks, CyberArk, Fortinet Short Duolingo porque no tiene búlgaro Y finalmente nos explicarán algunos de sus errores antes de pasar a las preguntas cortas y las preguntas finales.
Biden's budget earmarks thirteen billion bucks for cybersecurity. DOJ targets AI abuse. A US trade mission to the Philippines includes cyber training. CISA and OMB release a secure software attestation form. CyberArk explores AI worms. Russia arrests a South Korean on cyber espionage charges. French government agencies are hit with DDoS attacks. Jessica Brandt is named director of the Foreign Malign Influence Center. Afternoon Cyber Tea host Ann Johnson speaks with her guest Keren Elazari about the hacker mindset. Google builds itself the Bermuda Triangle of Broadband. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Afternoon Cyber Tea host Ann Johnson talks with her guest Keren Elazari about the hacker mindset. To hear the full conversation, please listen to the episode of Afternoon Cyber Tea. Selected Reading US Federal Budget Proposes $27.5B for Cybersecurity (GovInfo Security) Justice Department Beefs up Focus on Artificial Intelligence Enforcement, Warns of Harsher Sentences (SecurityWeek) Microsoft to train 100,000 Philippine women in AI, cybersecurity (South China Morning Post) US launches secure software development attestation form to enhance federal cybersecurity (Industrial Cyber) The Rise of AI Worms in Cybersecurity (Security Boulevard) South Korean detained earlier this year is accused of espionage in Russia, state news agency says (Associated Press) Massive cyberattacks hit French government agencies (Security Affairs) ODNI appoints new election security leader ahead of presidential race (The Record) Google's self-designed office swallows Wi-Fi “like the Bermuda Triangle” ( Ars Technica) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
In a world where the digital landscape is continually evolving, how do we ensure that women's voices are heard and valued, especially in the tech sector? This International Women's Day, join us on Tech Talks Daily Podcast as we sit down with Eduarda Camacho, the dynamic COO of CyberArk, a global leader in identity security. From facing doubts about her potential in tech due to her gender, nationality, and non-engineering background to ascending to the executive ranks and making a significant impact, Eduarda's journey is nothing short of inspiring. In this candid conversation, Eduarda shares the challenges and triumphs of her career, offering invaluable advice to women navigating the tech industry. She emphasizes the importance of staying authentic, seeking support when necessary, and the power of perseverance. But Eduarda's insights don't stop there. As the new COO of CyberArk, she outlines her vision and goals for the company, focusing on driving customer value, expanding platform adoption, and gearing the organization for growth and scalability. We also delve into CyberArk's latest groundbreaking research, revealing that women are more concerned than men about the use of AI by cybercriminals to compromise their digital identities. Eduarda explores why women perceive their digital assets like social media profiles and personal photos as more integral to their identity and why they feel more vulnerable to AI-powered impersonation attacks. This discussion opens up a broader conversation on the gendered dimensions of cybersecurity and the critical need for more inclusive strategies to combat evolving digital threats. Eduarda's commitment to fostering diversity and inclusion in cybersecurity is a testament to her belief in the strength of diverse perspectives. As we navigate the complexities of AI in cyberattacks, Eduarda's leadership at CyberArk signifies a hopeful step toward a more secure and inclusive digital future. Why do these gendered perceptions and concerns around cybersecurity exist, and what can we do to address them? Join us as Eduarda Camacho shares her expertise, experiences, and the proactive measures CyberArk is taking to stay ahead of cyber threats in an AI-driven world. Share your thoughts and join the conversation about women's role in shaping the future of technology and cybersecurity. How can we further empower women in the tech industry and ensure their security concerns are addressed? Share your thoughts with us and let's continue the conversation.
In der heutigen Folge „Alles auf Aktien“ sprechen die Finanzjournalisten Anja Ettel und Holger Zschäpitz über die Verlierer und Gewinner aus dem Republikaner-Portfolio von Goldman Sachs und lukrative Margenkönige, die sogar die Erfolgsaktie von Nvidia schlagen. Außerdem geht es um Reddit, Super Micro Computer, Viking Therapeutics, Zealand Pharma, Pfizer, Novo Nordisk, Eli Lilly, JP Morgan, Morgan Stanley, GS, Allegheny Technologies, Ryerson Holding, Aecom, Granite Construction, KBR, Axon Enterprise, Crowdstrike, Coterra Energy, Chevron, ExxonMobil, Peabody Energy, Consol Energy, Texas Instruments, Applied Materials, Broadcom, Squarespace, Toast, American Eagle Outfitters, Gap, Lululemon, Urban Outfitters, Nike, 3M, Emerson Electric, Qualcomm, Skyworks Solutions, SunRun, Rayonier, Air Products & Chemicals, Linde, Next Era Energy, Rivian, Tesla, Northtrop Grumman, RTX, Booz Allen Hamilton, General Dynamics, Autodesk, Apple, Cadence, Gitlab, Cloudflare, Salesforce, Adobe, Zoominfo, Nutanix, Monday.com, Constellation, Hubspot, Palo Alto Networks, Datadog, CyberArk, WisdomTree und Cybersecurity. Wir freuen uns an Feedback über aaa@welt.de. Ab sofort gibt es noch mehr "Alles auf Aktien" bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. Außerdem bei WELT: Im werktäglichen Podcast „Das bringt der Tag“ geben wir Ihnen im Gespräch mit WELT-Experten die wichtigsten Hintergrundinformationen zu einem politischen Top-Thema des Tages. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
The federal government poses unique challenges in identity management. They are constrained by heavy security, a surfeit of data, and, most importantly, a limited budget. Today's interview takes all three aspects into account and offers listeners creative solutions to solve the vexing crisis in federal identity management. One of the first concerns is mobility. This does not just apply to military operations which, by definition, will be all over the world. Today's civilian agencies like FEMA have emergency remote users as well as many employees and contractors working remotely. The initial secure environment includes PKI processes that work well on a desktop system; now so much on a mobile. During the interview, it was suggested that a centralized model of identity verification may be the solution that can manage circumstances that do not include desktop computers. In a nod to the human condition, it was observed that if the identity solution is not convenient or will be subverted. SailPoint's Frank Brugulio points out that once a stable initial process is designed, then one must worry about continuous monitoring. The federal government includes legacy systems that may not work with new identity management systems, and a person's attributes may change, What the first federal systems designers never imagined is a fact brought out by James Imanian from CyberArk. He states that today, we must deal with forty-five machine identities for each human. When you throw all these factors together, you must understand that we are dealing with a limited budget and staff. Well deployed artificial intelligence can do menial tasks like recognizing unauthorized devices, advanced logging analytics, some sticky compliance issues.
Episode 323 of The VentureFizz Podcast features Elizabeth Lawler, Founder & CEO of AppMap. A question that I ask every guest at the end of every interview is - “What do you like to do for fun outside of work?” Oftentimes, I get common answers like - hiking, traveling, etc. But, Elizabeth's answer has by far been the best one yet and it is proof that she is not only a great entrepreneur but also a maker at heart. Elizabeth is building with her husband & Co-Founder, Kevin, and their kids, a two seater RV-12 airplane. They previously built a car together when the kids were 6 & 8 years old, so this is their next challenge. So cool! AppMap is a leading developer of code visualization and runtime code review analysis technology. Its platform is redefining how developers improve their software and has become one of the fastest-growing tools for software visualization and runtime analysis. The company has raised $10 million in funding. In this episode of our podcast, we cover: * A deep conversation around community building and the importance of authenticity. * Elizabeth's background story and how she learned entrepreneurship from her parents. * Getting her career started in public health research and epidemiology after receiving her PhD. * The background story of Conjur, which was bootstrapped initially and raised a minimal amount of capital and had a successful exit to CyberArk. * Preferred versus common stock and how that affects the payout post-acquisition. * All the details about AppMap and how they built traction and got developers to engage with their product. * How Elizabeth is supporting women entrepreneurs and the role that Andy Palmer is playing, as well. * And so much more.
In this episode of Trust Issues, CyberArk's resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don't be a bot – check it out!