Podcasts about cyberark

  • 132PODCASTS
  • 432EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 1, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyberark

Latest podcast episodes about cyberark

Software Defined Talk
Episode 531: YAYAML

Software Defined Talk

Play Episode Listen Later Aug 1, 2025 59:05


This week, we discuss the AI hype cycle, Astronomer's viral moment, and yet another YAML flavor — KYAML. Plus, private equity is coming for your donuts. Watch the YouTube Live Recording of Episode (https://www.youtube.com/live/Lul4dCCIT24?si=qeBAZXHmFBdRuuAx) 531 (https://www.youtube.com/live/Lul4dCCIT24?si=qeBAZXHmFBdRuuAx) Runner-up Titles Sometimes it's hard to make money I've given into Big Donut Maybe you can fake your way through life At some point you have to have some expertise AI has no taste Can you fix my PowerPoint? There is a chance we're all going to be naked soon Gobbling up the dark fiber WHYAML Waymo for Babies Rundown Beloved Texas doughnut chain sold to California equity firm (https://www.khou.com/article/news/local/shipley-do-nuts-sold-private-equity-houston-texas/285-259116a6-8819-4b32-8ca8-20359bb4f1e1) AI Mid-Year Hype-Cycle Check-in Gartner hype cycle (https://en.wikipedia.org/wiki/Gartner_hype_cycle) Betting on AI: The Delusion Driving Big Tech - Last Week in AWS Podcast (https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/betting-on-ai-the-delusion-driving-big-tech/) Clouded Judgement 7.25.25 - TAMs Lie (https://cloudedjudgement.substack.com/p/clouded-judgement-72525-tams-lie?utm_source=post-email-title&publication_id=56878&post_id=169176822&utm_campaign=email-post-title&isFreemail=true&r=2l9&triedRedirect=true&utm_medium=email) Microsoft's AI CEO thinks Copilot will age and ‘have a room that it lives in' (https://www.theverge.com/news/713715/microsoft-copilot-appearance-feature-age-mustafa-suleyman-interview) Flaw in Gemini CLI coding tool could allow hackers to run nasty commands (https://arstechnica.com/security/2025/07/flaw-in-gemini-cli-coding-tool-allowed-hackers-to-run-nasty-commands-on-user-devices/) Claude Code is a slot machine (https://rgoldfinger.com/blog/2025-07-26-claude-code-is-a-slot-machine/) The Hater's Guide to the AI Bubble (https://www.wheresyoured.at/the-haters-gui/) 2025 Stack Overflow Developer Survey (https://survey.stackoverflow.co/2025/) 2025 Stack Overflow sentiment and usage section (https://survey.stackoverflow.co/2025/ai/#sentiment-and-usage) Astronomer Data Pipelines with Apache Airflow (https://www.thecloudcast.net/2025/07/data-pipelines-with-apache-airflow.html) Astronomer (@astronomerio) on X (https://x.com/astronomerio/status/1948890827566317712?s=46&t=EoCoteGkQEahPpAJ_HYRpg) Ryan Reynolds' ad agency, was behind the Gwyneth Paltrow Astronomer ad (https://www.businessinsider.com/ryan-reynolds-maximum-effort-gwyneth-paltrow-astronomer-ad-2025-7) Introducing KYAML, a safer, less ambiguous YAML subset / encoding (https://github.com/kubernetes/enhancements/blob/master/keps/sig-cli/5295-kyaml/README.md#summary) Palo Alto Networks to acquire CyberArk in $25 billion deal (https://www.cnbc.com/2025/07/30/palo-alto-networks-cyberark-deal.html) Relevant to your Interests Microsoft's Satya Nadella says job cuts have been 'weighing heavily' on him (https://www.cnbc.com/2025/07/24/microsoft-satya-nadella-memo-layoffs.html) IBM shares drop as software revenue misses (https://www.cnbc.com/2025/07/23/ibm-q2-earnings-report-2025.html) MSFT Teams in your car? (https://www.theverge.com/news/708481/microsoft-teams-mercedes-benz-integration-in-car-camera-support) Y2K38 bug? Debian switching to 64-bit time for everything (https://www.theregister.com/2025/07/25/y2k38_bug_debian/) A.I.-Driven Education: Founded in Texas and Coming to a School Near You (https://www.nytimes.com/2025/07/27/us/politics/ai-alpha-school-austin-texas.html) How Anthropic teams use Claude Code (https://www.anthropic.com/news/how-anthropic-teams-use-claude-code?utm_source=changelog-news) Anthropic unveils new rate limits to curb Claude Code power users (https://techcrunch.com/2025/07/28/anthropic-unveils-new-rate-limits-to-curb-claude-code-power-users/) Alphabet's Q2 revenue beats estimates as cloud computing surges (https://www.fastcompany.com/91373657/alphabet-google-earnings-q2-cloud-ai) Listener Feedback Steve recommends Lessons from Production (https://podcast.techwithkunal.com) Podcast (https://podcast.techwithkunal.com) Conferences Sydney Wizdom Meet-Up (https://www.wiz.io/events/sydney-wizdom-meet-up-aug-2025), Sydney, August 7. Matt will be there. SpringOne (https://www.vmware.com/explore/us/springone?utm_source=organic&utm_medium=social&utm_campaign=cote), Las Vegas, August 25th to 28th, 2025. See Coté's pitch (https://www.youtube.com/watch?v=f_xOudsmUmk). Explore 2025 US (https://www.vmware.com/explore/us?utm_source=organic&utm_medium=social&utm_campaign=cote), Las Vegas, August 25th to 28th, 2025. See Coté's pitch (https://www.youtube.com/shorts/-COoeIJcFN4). Wiz Capture the Flag (https://www.wiz.io/events/capture-the-flag-brisbane-august-2025), Brisbane, August 26. Matt will be there. SREDay London (https://sreday.com/2025-london-q3/), Coté speaking, September 18th and 19th. Civo Navigate London (https://www.civo.com/navigate/london/2025), Coté speaking, September 30th. Texas Linux Fest (https://2025.texaslinuxfest.org), Austin, October 3rd to 4th. CFP closes August 3rd (https://www.papercall.io/txlf2025). CF Day EU (https://events.linuxfoundation.org/cloud-foundry-day-europe/), Frankfurt, October 7th, 2025. AI for the Rest of Us (https://aifortherestofus.live/london-2025), Coté speaking, October 15th to 16th, London. SDT News & Community Join our Slack community (https://softwaredefinedtalk.slack.com/join/shared_invite/zt-1hn55iv5d-UTfN7mVX1D9D5ExRt3ZJYQ#/shared-invite/email) Email the show: questions@softwaredefinedtalk.com (mailto:questions@softwaredefinedtalk.com) Free stickers: Email your address to stickers@softwaredefinedtalk.com (mailto:stickers@softwaredefinedtalk.com) Follow us on social media: Twitter (https://twitter.com/softwaredeftalk), Threads (https://www.threads.net/@softwaredefinedtalk), Mastodon (https://hachyderm.io/@softwaredefinedtalk), LinkedIn (https://www.linkedin.com/company/software-defined-talk/), BlueSky (https://bsky.app/profile/softwaredefinedtalk.com) Watch us on: Twitch (https://www.twitch.tv/sdtpodcast), YouTube (https://www.youtube.com/channel/UCi3OJPV6h9tp-hbsGBLGsDQ/featured), Instagram (https://www.instagram.com/softwaredefinedtalk/), TikTok (https://www.tiktok.com/@softwaredefinedtalk) Book offer: Use code SDT for $20 off "Digital WTF" by Coté (https://leanpub.com/digitalwtf/c/sdt) Sponsor the show (https://www.softwaredefinedtalk.com/ads): ads@softwaredefinedtalk.com (mailto:ads@softwaredefinedtalk.com) Recommendations Brandon: Uber Teen (https://www.uber.com/us/en/ride/teens/) Matt: Software Defined Interviews - Chris Dancy (https://www.softwaredefinedinterviews.com/105) Photo Credits Header (https://unsplash.com/photos/white-and-black-floral-round-decor-qZ6uvJHLHFc)

Audio News
PALO ALTO FORTALECE SU APUESTA EN SEGURIDAD DE IDENTIDAD CON LA COMPRA DE CYBERARK

Audio News

Play Episode Listen Later Jul 31, 2025 4:14


Uniendo tecnologías avanzadas impulsadas por inteligencia artificial para proteger identidades humanas, de máquinas y agentes autónomos, Palo Alto Networks adquiere a CyberArk, en una operación que marca su ingreso definitivo al mercado de seguridad de identidades.

Squawk on the Street
Starbucks CEO Talks Turnaround Plan, Palo Alto-CyberArk $25B deal, Hassett on GDP, Tariffs and the Fed 7/30/25

Squawk on the Street

Play Episode Listen Later Jul 30, 2025 48:25


David Faber and Jim Cramer kicked off a big show with Starbucks CEO Brian Niccol in a "First on CNBC" interview on the company's quarterly results and turnaround plan. Palo Alto Networks CEO Nikesh Arora and CyberArk Software Founder and Executive Chairman Udi Mokady appeared on the program to discuss their companies' $25 billion merger deal.National Economic Council Director Kevin Hassett joined the show with White House reaction to stronger-than-expected Q2 GDP, as well as views on tariffs and the Fed on rate decision day for the central bank. Also in focus: Earnings parade winners and losers, more woes for Wegovy maker Novo Nordisk. Squawk on the Street Disclaimer

Squawk on the Street
SOTS 2nd Hour: Meta Expectations, Fed in Focus, and the View From The C-Suite – w/GSK & Hershey CEOs 7/30/25

Squawk on the Street

Play Episode Listen Later Jul 30, 2025 42:59


Stocks hovering around record highs ahead of a Fed decision and key report cards out of Big Tech: Sara Eisen and David Faber broke down the latest on the data front (Q2 GDP, new payrolls data, and pending home sales at the top of the hour) along with some new commentary around prices and tariffs from consumer-facing earnings. RBC Tech analyst Brad Erickson broke down his bull case for Meta ahead of results tonight, while former Fed President Esther George discussed her predictions when it comes to Fed Chair Powell and rates.  Plus: the view from the C-Suite… This hour: the CEO of pharmaceutical giant GlaxoSmithKline talked her expectations for tariffs on the industry; hear the CEO of Starbucks' take on competition, as same-store sales there disappoint; the CEO of Hershey joined the team for her last broadcast interview in the role with the her latest on the consumer, M&A expectations, and legacy; and more from the CEO of Palo Alto as the company announces plans to acquire CyberArk for ~$25B. Squawk on the Street Disclaimer

Nightly Business Report
A Fed Divided, A Cybersecurity Deal, and Zuck's “Superintelligence” 7/30/25

Nightly Business Report

Play Episode Listen Later Jul 30, 2025 43:26


The Federal Reserve the most divided its been in more than 30 years, with two governors expected to dissent in today's decision amid President Trump's repeated calls for Chair Powell to lower rates. Palo Alto poised to buy Cyberark. Plus, Meta's push to create a new category of AI-powered personal assistants. 

OHNE AKTIEN WIRD SCHWER - Tägliche Börsen-News
“Novo Nordisk crasht 20%” - Heidelberger Druck x Waffen, PayPal, Spotify, ETF kostet

OHNE AKTIEN WIRD SCHWER - Tägliche Börsen-News

Play Episode Listen Later Jul 30, 2025 13:49


Hier geht's zum Xetra Liquidity Measure, den Markus angesprochen hat. Aktien + Whatsapp = Hier anmelden. Lieber als Newsletter? Geht auch. Das Buch zum Podcast? Jetzt lesen. Takeover-Tuesday: Union Pacific schluckt Norfolk. Baker Hughes schluckt Chart Industries. Palo Alto schluckt vielleicht CyberArk. Zahlen von PayPal, Spotify & UPS durchwachsen bis schlecht. Zahlen von Cadence gut. Heidelberger Druck goes Rüstung. Novo Nordisk (WKN: A3EU6F) hat seine Umsatzprognose dezimiert und einen neuen CEO. Buy The Dip oder Finger weg vom fallenden Messer? Was kostet ein ETF? Die Gesamtkostenquote ist nur ein Teil der Antwort. Es geht um die TCO. Wie findet man die raus? Und was ist da genau drin? Wir klären auf. Diesen Podcast vom 30.07.2025, 3:00 Uhr stellt dir die Podstars GmbH (Noah Leidinger) zur Verfügung.

KuppingerCole Analysts
Palo Alto + CyberArk? A Strategic Expansion Into Identity Security — But With Questions

KuppingerCole Analysts

Play Episode Listen Later Jul 30, 2025 16:39


In a groundbreaking move, Palo Alto targets a $25 billion acquisition of CyberArk, poised to reshape identity security landscapes. As two cybersecurity giants converge, explore this narrative of strategic synergy versus the challenge of seamless integration. With potential market upheaval at stake, the acquisition promises to redefine the rules of identity security. Read the original blog post here: https://www.kuppingercole.com/blog/leal/palo-alto-cyberark-a-strategic-expansion-into-identity-security-but-with-questions

AEX Factor | BNR
Deze twee speciaaltjes doen het onmogelijke!!

AEX Factor | BNR

Play Episode Listen Later Jul 30, 2025 26:49


Toyota meldt recordverkopen, terwijl de concurrentie dramatisch draait. Hermes verkoopt veel meer en dat terwijl de concurrentie steeds minder verkoopt. En de Amerikaanse economie draait als een zonnetje en merkt (nog) niks van Trumps tarieven.Je leest het goed: heel veel goed nieuws, maar ook veel onverwachts nieuws. Want waarom draaien Toyota en Hermes zo goed, terwijl andere bedrijven er niks van bakken? We zoeken deze uitzending uit hoe dat zit.We vertellen je ook over de miljardendeals die Elon Musk voor Tesla aan het sluiten is. Musk lijkt ineens een betere dealmaker dan president Trump. Over Trump gesproken: zijn team is nog steeds in overleg met de Chinezen. Ondertussen haalt hij wel uit naar India. Dat land wordt getrakteerd op 25 procent aan importheffingen. Verder bespreken we de cijfers van Just Eat Takeaway en JDE Peets. Vooral dat laatste bedrijf springt eruit. Buiten de Amsterdamse beurs kijken we ook, nog naar de cijfers van Adidas. Die kwartaalcijfers van de Duitsers zien er niet slecht uit, maar vallen wel slecht bij aandeelhouders. Starbucks komt ook nog voorbij, een mega-overname door cybersecuritybedrijf Palo Alto én het gaat over Australie. Daar raakt Youtube ineens een hele doelgroep kwijt! See omnystudio.com/listener for privacy information.

Trust Issues
EP 12 - From assumptions to accountability: A CISO's take on cloud risk

Trust Issues

Play Episode Listen Later Jul 29, 2025 41:20


What does "secure by default" really mean—and is it enough? In this episode of CyberArk's Security Matters, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company's AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.

Late Tech Show
Infrastrutture data center, identità per alimenti e App, investimenti delle PMI - S06e41

Late Tech Show

Play Episode Listen Later Jul 16, 2025 68:30


In questa puntata del Late Tech Show, il podcast B2B tech di Gigi Beltrame, si è parlato di:Data Center: potenza, calore e zcqua – sfatando i miti (con Stefano Mozzato di Vertiv) :l'architettura dei data center è in costante evoluzione. Dai 10-15 kW per rack, con l'avvento dell'Intelligenza Artificiale (GPU) si arriva a densità di 100-130 kW per rack, rendendo il raffreddamento a liquido una necessità per evitare il "surriscaldamento".Contrariamente a quanto si crede, i data center di nuova generazione in Italia non sprecano acqua. La maggior parte utilizza sistemi a circuito chiuso, rendendo il consumo d'acqua un falso mito legato a tecnologie superate.Un'opportunità emergente è il riutilizzo del calore in eccesso (l'acqua di raffreddamento può raggiungere i 50°C) per sistemi di teleriscaldamento ("district heating"), contribuendo a un bilancio energetico quasi neutro.L'esplosione delle identità digitali (con Paolo Lossa di CyberArk): non si tratta più solo di persone! Abbiamo esplorato il mondo delle identità digitali umane e non umane (macchine). Si stima un rapporto di 1 a 85 tra identità umane e macchine, un dato sorprendente! L'automazione, l'AI, l'IoT e il cloud stanno accelerando la proliferazione di credenziali macchina, creando un enorme rischio di "shadow machine identity". La soluzione? Strumenti di governance centralizzata, scoperta automatica, classificazione e politiche "least privilege" per mitigare i rischi.MyCIA e l'identità alimentare: l'innovazione a tavola (con Pietro Ruffoni di MyCIA):Un'iniziativa italiana ha creato la "Carta d'Identità Alimentare", un documento digitale gratuito che permette ai consumatori di specificare allergie, intolleranze e preferenze alimentari.MyCIA.it e MyCIA for Business collegano le esigenze dei consumatori con i menù dei ristoratori tramite un algoritmo brevettato, semplificando la gestione degli allergeni e promuovendo l'inclusività. Si sta spingendo per una proposta di legge che renda obbligatoria l'educazione alimentare nelle scuole primarie e secondarie, per favorire una maggiore consapevolezza.Le aziende italiane e gli investimenti in tecnologia (Soldo Spend Index con Gianluca Salpietro di Soldo):Le aziende italiane stanno accelerando la loro trasformazione digitale. La spesa in Intelligenza Artificiale è più che raddoppiata (+130%) nell'ultimo anno, focalizzandosi su agenti e generazione di contenuti.Anche la spesa in software è aumentata del 37%, parallelamente a una riduzione del 30% delle spese ricorrenti nelle grandi aziende, puntando all'efficienza e all'automazione.Un aumento del 41% nella spesa per servizi professionali evidenzia la difficoltà nel trovare competenze verticali interne e la preferenza per la flessibilità dei consulenti esterni.Sorprendentemente, la spesa per le traduzioni è cresciuta del 150%, nonostante l'AI generativa, indicando una maggiore produzione di contenuti multilingue.Il bisogno di incontrarsi non è svanito! Nonostante lo smart working, le spese di rappresentanza (+12%) e noleggio veicoli (+30%) sono aumentate, confermando il valore delle interazioni umane e personali.Con:Pietro Ruffoni MyCIA,Paolo Lossa CyberArk,Stefano Mozzato Vertiv,Gianluca Salpietro SoldoContattami per moderazioni, speech e consulenze: https://forms.gle/jtcv577NAd6gLWbi8

Security Breach
You Think You Know Me

Security Breach

Play Episode Listen Later Jul 2, 2025 35:43


Who are you?This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessing your systems and networks. The second, equally as challenging, but potentially more complex, focused on machine or asset identities and understanding how to keep this sprawling attack landscape more secure. Perhaps most interestingly, Brandon also offers some insight on cookies-based attacks and how, like so many cybersecurity challenges, the answers doesn't lie in the tech stack.Watch/listen as we also discuss:Solving identify management strategies by finding baseline controls.The unique dynamics of manufacturing when it comes to risk analysis and establishing these baselines.The role of asset visibility when it comes to identity management strategies.How to prevent those age-old turf battles between IT and OT.Why machine identities might pose the greatest cybersecurity risk.The importance of empathy in getting people to buy in to cybersecurity strategies and training.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Trust Issues
EP 10 - A new identity crisis: governance in the AI age

Trust Issues

Play Episode Listen Later Jun 26, 2025 36:20


In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.Listeners will learn:Why legacy identity governance models are breaking under cloud scaleHow AI agents are reshaping entitlement management and threat detectionWhat organizations must do to secure non-human identities and interlinked dependenciesWhy time-to-value and outcome-driven metrics are essential for modern IGA successWhether you're a CISO, identity architect, or security strategist, this episode delivers actionable guidance for navigating the evolving identity security landscape.

Stock Market Today With IBD
Indexes Show Upside Reversal At Key Support: CyberArk, Toast, Dollar General In Focus

Stock Market Today With IBD

Play Episode Listen Later Jun 23, 2025 20:51


Alissa Coram and Justin Nielsen analyze Monday's market action and discuss key stocks to watch on Stock Market Today. Learn more about your ad choices. Visit megaphone.fm/adchoices

Mingis on Tech
AI agents are the new cybersecurity nightmare | Ep. 233

Mingis on Tech

Play Episode Listen Later Jun 17, 2025 36:10


AI agents are revolutionizing productivity, but they're also creating a massive, growing security crisis for businesses. In this episode of Today in Tech, we chat with Clarence Hinton, Chief Strategy Officer at CyberArk, exploring the alarming findings from a new identity security survey covering over 2,600 cybersecurity leaders across 20 countries. We discuss: · Why 94% of organizations are using AI for security, but only 32% have controls in place · The rising threat of machine identities and identity silos · The dangers of AI-powered phishing, deepfakes, and voice scams · Why most companies are underestimating the privilege risk of AI agents · The explosion of shadow AI and unregulated tools in the enterprise · Human behavior: still the weakest security link If you're not thinking about how to secure AI agents now, you're already behind. :point_right: Don't miss this essential conversation for CISOs, IT leaders, and tech strategists. :pushpin: Watch, like, and subscribe for more tech security insights every week. #TodayInTech #AIsecurity #cybersecurity

The Tech Blog Writer Podcast
3303: CyberArk's David Higgins on the Real Risks Behind AI in the Enterprise

The Tech Blog Writer Podcast

Play Episode Listen Later Jun 6, 2025 34:18


What happens when machine identities outnumber human ones by a hundred to one? That's not a future scenario. It's already happening. In this episode, I'm joined by David Higgins, Senior Director at CyberArk, for a deep conversation about identity security in an environment increasingly shaped by AI agents, autonomous systems, and blurred digital boundaries. David brings clarity to the growing risks tied to machine credentials and explains why so many organisations are still struggling with password reuse, unsecured personal devices, and outdated security awareness efforts. We explore the rise of deepfake scams, AI-powered impersonation, and the worrying trend of attackers bypassing savvy users by targeting helpdesks and support channels instead. What stood out is how David reframes the conversation around human behaviour and responsibility. Rather than blaming users as the weakest link, he argues that identity security needs to be rooted in context, culture, and proactive design. From adaptive authentication to just-in-time access models, there are smarter ways forward that balance security and user experience without turning employees into roadblocks. And we go even further. We talk about the next phase of risk, where AI agents aren't just tools but semi-autonomous actors capable of learning and adapting. What happens when one of these agents goes off-script? What safeguards are in place if they begin to behave in ways their developers didn't anticipate? This episode is not about hype. It's a practical look at what identity-first security really means in a machine-dominated environment. So let's hear it: do you think your business is ready for this shift? Or are we still relying too much on assumptions that no longer hold up? Let me know what you think after listening.

Facts vs Feelings with Ryan Detrick & Sonu Varghese
Talking with Dan Ives about the Future of Tech, AI and Innovation (Ep. 137)

Facts vs Feelings with Ryan Detrick & Sonu Varghese

Play Episode Listen Later May 28, 2025 42:08


In the latest episode of Facts vs Feelings, Ryan Detrick, Chief Market Strategist, and Sonu Varghese, VP, Global Macro Strategist, welcome tech analyst Dan Ives, Managing Director at Wedbush, to discuss the state of AI, the future of autonomous technologies, China-U.S. relations in tech, and investment opportunities beyond the usual headlines.Broadcasting from Carson's 2025 Spring Partner Summit in Omaha, this conversation blends covers everything from Tesla and Palantir to Microsoft's AI momentum and more.Key TakeawaysTesla Is Not Just a Car Company: Dan emphasized that Tesla should be valued as a disruptive AI and robotics company, not merely an automaker. Autonomous robotics are seen as a core driver of its future valuation.AI Party Is Just Getting Started: We're still in the early innings of the AI revolution—around “10:30 p.m.” on an all-night timeline, according to Dan. He likens skeptics to party-poopers who will wish they had joined once the sun comes up.China Cannot Be Decoupled: Efforts to cut ties with China in tech manufacturing are unrealistic, says Dan. The U.S. relies heavily on Chinese infrastructure, and disrupting this would have broad economic consequences.Apple as the AI Highway: While Apple may have lagged in AI innovation early on, Dan believes it will become the dominant platform for consumer AI applications thanks to its vast device ecosystem and installed base.Microsoft's Untapped AI Monetization: Despite a recent lull in stock performance, Dan sees Microsoft as massively underappreciated in its AI capabilities, especially within its enterprise customer base.Google (Alphabet) Is Underloved: Alphabet is currently the most underestimated of the “Magnificent Seven” tech stocks, particularly due to overstated concerns about search being disrupted by AI.Palantir's Long-Term Role: Dan projects Palantir as a trillion-dollar company in the making, thanks to its growing role in enterprise and sovereign AI applications.AI Stocks Beyond the Headlines: Emerging names like Pegasystems, SoundHound, Veronis, and CyberArk are cited as under-the-radar plays in the AI boom, especially in areas like cybersecurity and data infrastructure.Autonomous + Robotics = Game Changer: Dan envisions a near-future where humanoid robots under $20,000 become household norms—transforming labor, transportation, and daily life.Bitcoin's Role in Tech: Bitcoin's institutional adoption is growing, and Dan sees it as a risk-on asset with increasing relevance, especially in a deregulated environment. Connect with Ryan:• LinkedIn: Ryan Detrick• X: @ryandetrick Connect with Sonu:• LinkedIn: Sonu Varghese• X: @sonusvarghese Connect with Dan:• LinkedIn: Daniel Ives• X: @DivesTech Questions about the show? We'd love to hear from you! factsvsfeelings@carsongroup.com#FactsVsFeelings #DanIves #AIRevolution #TeslaAI #MicrosoftAI #TechInvesting #AutonomousFuture #InnovationEconomy #NVIDIA #Palantir #CryptoAndTech #ChinaUSRelations #BigTech #FutureOfWork #CarsonPartners #FinancialPodcast 

Trust Issues
EP 8 - Zero Trust, Zero Chill: Securing Machine Identity

Trust Issues

Play Episode Listen Later May 28, 2025 45:08


In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.According to the CyberArk 2025 Identity Security Landscape, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don't forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.

Defence Connect Podcast
CYBER UNCUT: CyberArk's Thomas Fikentscher on why cyber security should not be an afterthought

Defence Connect Podcast

Play Episode Listen Later May 26, 2025 33:28


In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk's head of ANZ operations, to explore the company's international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberArk's international operations and recent trends regarding how businesses are looking at their networks and what's essential to keep their operations running smoothly. The pair then discuss the importance of understanding and implementing privileged access to data and how that can keep critical infrastructure secure. Fikentscher talks about the recent blackouts in Spain and the challenges of introducing AI agents into workflows. Fikentscher discusses why modern privileged access management (PAM) must extend beyond traditional admin controls as organisations scale across cloud and AI environments. He explains it now needs to secure both human and machine identities, manage ephemeral access and integrate seamlessly into DevOps workflows. Finally, he emphasises the importance of a ‘security by design' approach - embedding security into the architecture of systems and processes from the start to strengthen resilience and compliance, but also to help prevent security lapses that can disrupt business operations and impact bottom lines.   Enjoy the episode, The Cyber Uncut team

Cyber Security Uncut
CyberArk's Thomas Fikentscher on why cyber security should not be an afterthought

Cyber Security Uncut

Play Episode Listen Later May 26, 2025 33:28


In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk's head of ANZ operations, to explore the company's international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberArk's international operations and recent trends regarding how businesses are looking at their networks and what's essential to keep their operations running smoothly. The pair then discuss the importance of understanding and implementing privileged access to data and how that can keep critical infrastructure secure. Fikentscher talks about the recent blackouts in Spain and the challenges of introducing AI agents into workflows. Fikentscher discusses why modern privileged access management (PAM) must extend beyond traditional admin controls as organisations scale across cloud and AI environments. He explains it now needs to secure both human and machine identities, manage ephemeral access and integrate seamlessly into DevOps workflows. Finally, he emphasises the importance of a ‘security by design' approach - embedding security into the architecture of systems and processes from the start to strengthen resilience and compliance, but also to help prevent security lapses that can disrupt business operations and impact bottom lines.   Enjoy the episode, The Cyber Uncut team

C'est votre argent
On achète ou on vend ? : CyberArk, ASML, et Essilor – 16/05

C'est votre argent

Play Episode Listen Later May 16, 2025 4:38


Ce vendredi x mois année, Liste INVITES et FONCTiON, se sont penchés sur les titres (....à lister... ), dans On achète ou on vend ? dans l'émission C'est Votre Argent présentée par Marc Fiorentino. C'est Votre Argent est à voir ou écouter le vendredi sur B

GREY Journal Daily News Podcast
What secrets are driving the surge in identity security funding

GREY Journal Daily News Podcast

Play Episode Listen Later May 6, 2025 4:25


Identity management attracts significant investment as startups secure over $300 million, and a major eyeball-scanning service launches in the U.S. Persona leads a Series D funding round with $200 million to enhance identity verification tools amid rising AI trends. Veza follows with $108 million in Series D funding, focusing on identity security tailored for an AI-dominant environment. The U.S. launches World, co-founded by Sam Altman, offering iris scan-based identity verification across five locations, raising $244 million to develop tech that distinguishes humans from AI. Numerous identity security startups garner substantial investments, with Aura raising over $660 million and Semperis close to $500 million. Public interest grows, evident in Okta's $20 billion market cap and CyberArk's $17 billion valuation. The identity management market projects to exceed $24 billion this year, driven by remote work and cloud reliance. Anticipated growth in biometric authentication takes shape as AI bot traffic is expected to represent around 90% of online activity by the decade's end, creating challenges for businesses to identify genuine users versus malicious bots.Learn more on this news visit us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.

The CyberWire
When AI gets a to-do list. [Research Saturday]

The CyberWire

Play Episode Listen Later May 3, 2025 24:22


This week, we are joined by ⁠Shaked Reiner⁠, Security Principal Security Researcher at ⁠CyberArk⁠, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check. The research can be found here: ⁠Agents Under Attack: Threat Modeling Agentic AI Learn more about your ad choices. Visit megaphone.fm/adchoices

Trust Issues
EP 6 - Incident Response POV: 2025 Emerging Threats

Trust Issues

Play Episode Listen Later Apr 30, 2025 36:41


In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.

MONEY FM 89.3 - Workday Afternoon with Claressa Monteiro
Industry Insight: Why the rapid growth of machine identities is cause for concern

MONEY FM 89.3 - Workday Afternoon with Claressa Monteiro

Play Episode Listen Later Apr 10, 2025 12:51


Machine identities, unique digital credentials, like digital certificates or keys, are becoming increasingly important as organisations accelerate digital transformation, adopt cloud services, and integrate automation. They are Yet, more often than not, they are poorly managed and dangerously exposed. According to global identity security firm CyberArk, over three-quarters of Asia Pacific security leaders have reported incidents linked to compromised machine identities. As enterprises scale their digital operations, how can they safeguard the growing network of bots, APIs, and AI agents interacting behind the scenes? Ssu Han Koh, Solutions Engineering Director for ASEAN, CyberArk, shares insights into the evolving threat landscape and why it is time companies give machines a seat at the identity table. See omnystudio.com/listener for privacy information.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 232: Managing Authentication in the Modern Enterprise (CISSP Domain 5.2)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 31, 2025 48:09 Transcription Available


Send us a textIdentity management sits at the core of effective cybersecurity, yet many organizations still struggle with implementing it correctly. In this comprehensive breakdown of CISSP Domain 5.2, we dive deep into the critical components of managing identification and authentication systems that protect your most valuable assets.Starting with a timely examination of the risks involved in the proposed rapid rewrite of the Social Security Administration's 60-million-line COBOL codebase, we explore why rushing critical identity systems can lead to catastrophic failures. This real-world example sets the stage for understanding why proper authentication management matters.The episode walks through the essential differences between centralized and decentralized identity approaches, explaining when each makes sense for your organization. We break down Single Sign-On implementation, multi-factor authentication best practices, and the often overlooked importance of treating Active Directory as the security tool it truly is—not just an open database for anyone to query.For security practitioners looking to level up their authentication strategy, we examine credential management systems like CyberArk, Just-in-Time access models, and federated identity frameworks including SAML, OAuth 2.0, and OpenID Connect. Each approach is explained with practical implementation considerations and security implications.Whether you're studying for the CISSP exam or working to strengthen your organization's security posture, this episode provides actionable insights on establishing robust authentication controls without sacrificing usability. Don't miss these essential strategies that form the foundation of your security architecture.Ready to master CISSP Domain 5.2 and all other CISSP domains? Visit CISSPCyberTraining.com for structured learning materials designed to help you pass the exam the first time.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Topline
E98: Ryan Burke on Zilla Security's $175M Aquisition and the Realities of M&A

Topline

Play Episode Listen Later Mar 2, 2025 69:42


In this episode of Topline, we sit down with Ryan Burke, VP of Sales at CyberArk (former VP of Sales at Zilla Security), to dive deep into the $175 million acquisition of Zilla. Ryan shares what it's really like to navigate an exit in today's market—from the unexpected nature of M&A deals to the grueling due diligence process and the tough decisions that founders and executives face. We also explore the evolving cybersecurity landscape, why big platforms are scooping up smaller companies earlier, and how AI is both a threat and an opportunity in the industry. Plus, we discuss the power of trusted networks in sales, whether the "Rolodex hire" is making a comeback, and how partnerships are shaping go-to-market strategies.   Thanks for tuning in! Want more content from Pavilion?    New episodes of Topline drop every Sunday with new Topline Spotlight mini-episodes every Thursday. Subscribe to never miss an episode.   Stay ahead with the latest industry developments, emerging go-to-market trends, and valuable benchmarking data. Subscribe to Topline Newsletter for GTM insights from Asad Zaman every Thursday.   Tune into The Revenue Leadership Podcast with Kyle Norton every Wednesday. He dives deep into the strategies and tactics that drive success as a revenue leader, featuring real operators like Jason Lemkins of SaaStr, Stevie Case of Vanta, and Ron Gabrisko of Databricks.   Your're invited! Join the free Topline Slack channel to connect with 600+ revenue leaders, share insights, and keep the conversation going beyond the podcast!   Key Chapters: (00:00) - The Exciting Exit of Zilla Security (07:40) - Navigating the Acquisition Process (16:19) - The Impact of Market Conditions on Startups (25:04) - Sales Team Dynamics During Transitions (32:32) - Trends in Cybersecurity and AI's Role (35:20) - Navigating Cybersecurity Challenges (38:38) - Mergers and Acquisitions in Cybersecurity (40:32) - The Impact of AI on Cybersecurity (43:14) - The Role of Trusted Networks in Sales (49:06) - Innovative Partnerships and Their Importance (01:00:01) - Effective Communication in Professional Settings  

The Daily Crunch – Spoken Edition
CyberArk snaps up Zilla Security for up to $175M

The Daily Crunch – Spoken Edition

Play Episode Listen Later Feb 14, 2025 3:34


Information security company CyberArk has acquired identity access and governance platform Zilla Security in a deal worth up to $175 million. Founded in 1999, Boston-based CyberArk specializes in access management, including privileged access security which helps organizations protect sensitive data and critical infrastructure from external (and internal) threats. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Trust Issues
Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)

Trust Issues

Play Episode Listen Later Feb 7, 2025 1:31


Welcome to Security Matters, the next evolution of CyberArk's podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security.Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Matters refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.Join Security Matters to explore why how you approach security truly matters.Coming mid-Feb. 2025 to this stream and most major podcast platforms. 

Trust Issues
EP 70 - Zero Days and High Stakes: The US Treasury Attack

Trust Issues

Play Episode Listen Later Jan 23, 2025 26:00


In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk's Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, "The US Treasury Attack: Key Events and Security Implications." 

Stock Market Today With IBD
Stocks End Strong Year On Weak Note; CyberArk, Nvidia, Tesla In Focus

Stock Market Today With IBD

Play Episode Listen Later Dec 31, 2024 26:30


Alissa Coram and Ed Carson analyze Tuesday's market action and discuss key stocks to watch on Stock Market Today.

AWS for Software Companies Podcast
Ep070: How CyberArk Scaled SaaS Transformation: Insights from CyberArk's SVP Corporate Finance Nili Serr-Reuven

AWS for Software Companies Podcast

Play Episode Listen Later Dec 19, 2024 41:21


This illuminating conversation with CyberArk's SVP of Finance, Nili Serr-Reuven, reveals how the 25-year-old cybersecurity leader successfully transformed from a traditional software company to a SaaS business model in just five quarters - far faster than the industry standard of 2-2.5 years - while maintaining strong margins and customer trust throughout the transition.Topics Include:Introduction to SaaS transformation challenges and opportunities.Tomaz Perc introduces Nili Serr Reuven from CyberArk.Overview of CyberArk's 25-year history and milestones.Transition from a perpetual model to SaaS.CyberArk's accelerated transformation in just five quarters.Challenges of shifting from product-centric to customer-centric.Importance of market research and peer consultations.Key role of cross-functional collaboration in success.Explanation of "swallowing the fish" in SaaS.Managing short-term revenue drops during SaaS transformation.CyberArk's 70% SaaS revenue share post-transformation.Impact of global economic challenges on business strategy.CyberArk's robust demand for identity security solutions.Strategic leadership's role in transformation execution.CyberArk's disciplined financial planning during uncertainty.Establishing KPIs like ARR and customer satisfaction.Managing rising cloud costs with FinOps practices.CyberArk's approach to pricing and packaging SaaS solutions.Leveraging acquisitions to speed up SaaS capabilities.Impact of transformation on CyberArk's finance department.Evolution of finance roles to support SaaS growth.Communication with investors during transformative periods.The importance of cultural shifts in transformation success.Continuous learning, transparency, and collaboration as cornerstones.Advice for future SaaS leaders: plan, communicate, adapt.Participants:Nili Serr Reuven – SVP Corporate Finance, CyberArkTomaz Perc – SaaS Business Lead, Amazon Web ServicesSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/

CISSP Cyber Training Podcast - CISSP Training Program
CCT 201: Practice CISSP Questions - Hardware and Firmware Knowledge Gap and Access Controls (Domain 5)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Dec 12, 2024 23:08 Transcription Available


Send us a textCould the lack of hardware and firmware knowledge be the Achilles' heel of today's cybersecurity efforts? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we unpack the critical challenges faced by IT and security leaders, particularly in hardware-intensive sectors like manufacturing. We expose the concerning gaps in understanding that are leaving organizations vulnerable, and propose actionable solutions like fostering stronger collaboration between IT teams, security personnel, and suppliers. Tackling the prevalent issue of BIOS password sharing, we recommend secure password management tools, like CyberArk, and advocate for a shift from the culture of replacing devices to one of repair and repurposing, all while ensuring data is securely erased to prevent breaches.Shifting focus to authentication and password security, this episode dives into the essentials of Role-Based Access Control (RBAC), two-factor authentication, and the power of identity federation with protocols like SAML or OAuth. We dissect the benefits of Single Sign-On (SSO) for seamless multi-application access, while highlighting the necessity of identity proofing during onboarding. Finally, we take a hard look at common password pitfalls, stressing the importance of robust security practices. Our mission? To empower listeners with the knowledge and resources they need to bolster their cybersecurity measures—visit CISSP Cyber Training and ReduceCyberRisk.com for a deeper dive into fortifying your defenses.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

Cyber Security Weekly Podcast
Episode 426 - New Standard for Machine Identity Security

Cyber Security Weekly Podcast

Play Episode Listen Later Dec 3, 2024 17:51


We speak with Venafi's Chief Innovation Officer, Kevin Bocek following the acquisition by Cyberark, effective as 1 October, 2024.Given Kevin's role over a decade with Venafi, he gives insight into what the acquisition of Venafi means for the customers of both companies and the market.We also discuss how the IAMs compliment each other and reflect the preference of customers to reduce the number of vendors, as well as responding to the state of play in terms of companies securing machine identities, and reflecting on the last 10 years how this will develop over the short to medium term.We also consider the emergence of Quantum and recent news that scientists have cracked a shortened RSA encryption.Recorded at Impact World Tour in Sydney, an identity security event, where, importantly Kevin has a key message for customers in APAC and Australia.#mysecuritytv #venafi #cyberark #impact2024 #iam #pam #identitysecurity

CISO Stories Podcast
Identity Challenges in Manufacturing - Tammy Klotz - CSP #202

CISO Stories Podcast

Play Episode Listen Later Nov 26, 2024 32:00


In this episode, we're joined by Tammy Klotz, a 3x CISO in the manufacturing industry, to explore identity security challenges in manufacturing environments. Tammy discusses the differences in access management for frontline workers versus knowledge workers, touching on the unique devices and role-based training requirements. Tune in to learn how tailored security solutions are key to managing access across diverse user groups in industrial settings. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-202

Trust Issues
EP 66 - Post-Election Insights: AI, Misinformation and Security

Trust Issues

Play Episode Listen Later Nov 21, 2024 37:49


In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James explains the differences between misinformation, disinformation and malinformation and their roles in the information environment surrounding elections.He also highlights the importance of public-private partnerships in securing election infrastructure and the role of international collaboration in countering nation-state threats. The episode examines the challenges of maintaining trust in the digital age and the potential of identity verification technologies to enhance information trustworthiness.Finally, the discussion touches on the parallels between election security and enterprise cybersecurity, emphasizing the need for critical thinking and proactive measures to uphold the integrity of both elections and organizational security.For more insights from James Imanian on election security, check out his blog, "Six Key Measures for Upholding Election Security and Integrity." 

CISO Stories Podcast
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201

CISO Stories Podcast

Play Episode Listen Later Nov 19, 2024 34:15


In this episode of CSP, we sit down with Dr. Sean Murphy, the CISO of BECU, one of Seattle's largest credit unions, to discuss the shifts in identity security brought on by the COVID-19 pandemic. Dr. Murphy highlights how Zero Trust architecture became crucial for verifying internal users, especially as remote work became the norm. He shares insights on the unique challenges of securing a remote workforce in the banking sector and underscores the importance of a robust identity security framework in protecting both members and employees in today's evolving threat landscape. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-201

CISO Stories Podcast
Identity Security Training: How important is it? - Eric Belardo - CSP #200

CISO Stories Podcast

Play Episode Listen Later Nov 12, 2024 30:31


Let's talk about what CISOs look for when hiring identity and access management team members. What training and experience is most attractive for the business and team. This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-200

CISO Stories Podcast
Have you ever had a pen tester own your network? - Julian Austin - CSP #199

CISO Stories Podcast

Play Episode Listen Later Nov 5, 2024 28:51


Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsored by Saviynt. Please visit https://cisostoriespodcast.com/saviynt to learn more and get a free demo! This segment is sponsored by Liminal. Visit https://cisostoriespodcast.com/liminal to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-199

Trust Issues
EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker

Trust Issues

Play Episode Listen Later Oct 23, 2024 50:00


In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker," which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.

Trust Issues
EP 62 - The Evolution of Identity

Trust Issues

Play Episode Listen Later Sep 25, 2024 46:10


In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines. In today's threat landscape, the number and types of identities, attack methods and environments have dramatically increased, making it more challenging to secure identities. Jeff discusses the challenges and efforts in creating sustainable, interoperable digital identity hubs for cross-border applications, the future of digital passports and the importance of encryption and multi-factor authentication (MFA) for securing sensitive data. The conversation also highlights the significance of thought leadership and maintaining a vendor-agnostic approach in identity security.

Explain IT
Why does everyone want my credentials?

Explain IT

Play Episode Listen Later Sep 24, 2024 38:34


Ever thought about how much of your life is protected by passwords? And why do hackers want to steal credentials? How do they do it and more importantly, how can we stop them in their tracks?From your emails to your retirement savings, passwords are quite literally the gatekeepers to your online life. And there are layers to password security, from your own password to the passwords that companies use to protect the collective data. Hackers are constantly using different tricks to try to crack those codes to access as much information as possible.In this episode, we'll get into the how's and why's to help you stay strong against cyber threats with the help of our guests; David Higgins, Field CTO at CyberArk and Tom Wheeler, Specialist Sales Manager for Networking and Security at Softcat.If you want to listen to more episodes from this season, new ones are released on the last Tuesday of every month. Alternatively, you can stream or download all episodes from every season on your preferred platform. Your host for this episode of Softcat's Explain IT podcast is Helen Gidney, Softcat's head of Architecture. Join us as we talk tech in simple jargon free language. Have you got a burning question for the team? Please send an email toHelenGi@softcat.comThis podcast is produced by The Podcast Coach. Hosted on Acast. See acast.com/privacy for more information.

一桶金之財經新思維
CyberArk莊龍源:網絡身分認證保安

一桶金之財經新思維

Play Episode Listen Later Sep 3, 2024 19:46


Stock Market Today With IBD
Market Suffers Expectation Breaker; Nvidia, Freshpet, CyberArk In Focus

Stock Market Today With IBD

Play Episode Listen Later Sep 3, 2024 18:46


The stock market rally sold off after the long holiday. The S&P 500, in a new power trend and on the cusp of a new high, retreated to its 21-day line. The Nasdaq tumbled below its 50-day and 21-day lines, with Nvidia selling off. Freshpet moved back into a buy zone, but slashed gains. CyberArk fell, but held up relatively well.

Cybercrime Magazine Podcast
"Transhuman" Hacker. Using His Body For Security Research. Len Noe, CyberArk Technical Evangelist.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 20, 2024 14:07


Len Noe, a professional ethical hacker, is a technical evangelist for CyberArk. Living with 10 microchips implanted in his body, Noe calls himself a "transhuman," and is hacking his body for security research. In this episode, he joins host Charlie Osborne to discuss his experience in detail, including what implants he has experimented with, how they can be used to conduct cyberattacks, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Trust Issues
EP 57 - Proactive Defense: Security's AI Infusion

Trust Issues

Play Episode Listen Later Jul 23, 2024 32:00


In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk's Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI Center of Excellence and the introduction of CyberArk CORA AI, an umbrella of AI capabilities infused within CyberArk's products.Join us as we examine the challenges and opportunities presented by AI in the cybersecurity landscape, the importance of fostering a culture of innovation and how CyberArk is leading the charge in securing identities in the AI era. This episode is a must-listen for anyone interested in the intersection of AI and identity security – and the future of cyber protection.

Trust Issues
EP 55 - AI Insights: Shaping the Future of IAM

Trust Issues

Play Episode Listen Later Jun 25, 2024 35:50


In this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company's Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the methodical, data-driven approaches to monetization strategies and the significance of learning from on-the-job experiences. This episode is a must-listen for anyone interested in the intersection of AI and IAM, and the opportunities it presents for leading the transition in the industry. Tune in to uncover what's coming down the AI pike and how it will influence the future of IAM.For more from Daniel on this subject, check out his recent blog, "Predicting the Future of AI in Identity and Access Management." 

Paul's Security Weekly
This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363

Paul's Security Weekly

Play Episode Listen Later May 24, 2024 159:17


Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process. We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss. A number of new product announcements continue to trickle out post-RSA. We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess. Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes! See the show notes for individual descriptions on each RSAC interview. This week, we feature speakers from Sailpoint, Okta, Ping Identity, LimaCharlie, QwietAI, and Picus! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-363

Equity
Maven takes the clout-chasing out of social media as Reddit teams up with OpenAI

Equity

Play Episode Listen Later May 20, 2024 11:04


Last week was a big one for AI news, and one thing that stood out to us was OpenAI's deal with Reddit. Per the terms of the deal, OpenAI will get to use content from Reddit like posts and replies to train its AI, and Reddit will get access to some unspecified AI tools. Reddit's stock soared 11% in extended trading following the news.That's not all we talked about on today's episode of Equity. This morning, Rebecca Bellan also walked us through a new social media platform called Maven that wants to do away with likes, followers and clout-chasing in favor of more serendipitous internet exploration. Maven was co-founded by OpenAI alum Kenneth Stanley and is backed by Twitter co-founder Ev Williams. Speaking of Twitter, X.com is officially live as a platform. Annoyingly for Elon Musk, so is Twitter.com.Bellan also covered some fresh cybersecurity consolidation. Israeli security firm CyberArk has purchased Venafi out from Thoma Bravo for $1.54 billion -- that's $1 billion in cash and the rest in shares.Before you go, don't miss the latest Pitch Deck Teardown from Haje Kamps. In today's segment Haje digs deep on Berlin-based startup Goodcarbon's deck. The startup just raised a €5.25 million (around $5.5 million) seed round to make its mark on the big business of carbon credits, and its pitch deck does a great job at showing traction, but is not so great its team slide. Listen to the end to learn more!Equity is TechCrunch's flagship podcast, produced by Theresa Loconsolo, and posts every Monday, Wednesday and Friday.Subscribe to us on Apple Podcasts, Overcast, Spotify and all the casts. You also can follow Equity on X and Threads at @EquityPod. For the full episode transcript, for those who prefer reading over listening, check out our full archive of episodes over at Simplecast. Credits: Equity is produced by Theresa Loconsolo with editing by Kell. Bryce Durbin is our Illustrator. We'd also like to thank the audience development team and Henry Pickavet, who manages TechCrunch audio products.

The CyberWire
Biden's budget boost for cybersecurity.

The CyberWire

Play Episode Listen Later Mar 12, 2024 27:10


Biden's budget earmarks thirteen billion bucks for cybersecurity. DOJ targets AI abuse. A US trade mission to the Philippines includes cyber training. CISA and OMB release a secure software attestation form. CyberArk explores AI worms. Russia arrests a South Korean on cyber espionage charges. French government agencies are hit with DDoS attacks. Jessica Brandt is named director of the Foreign Malign Influence Center. Afternoon Cyber Tea host Ann Johnson speaks with her guest Keren Elazari about the hacker mindset. Google builds itself the Bermuda Triangle of Broadband.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Afternoon Cyber Tea host Ann Johnson talks with her guest Keren Elazari about the hacker mindset. To hear the full conversation, please listen to the episode of Afternoon Cyber Tea. Selected Reading US Federal Budget Proposes $27.5B for Cybersecurity (GovInfo Security) Justice Department Beefs up Focus on Artificial Intelligence Enforcement, Warns of Harsher Sentences (SecurityWeek) Microsoft to train 100,000 Philippine women in AI, cybersecurity (South China Morning Post) US launches secure software development attestation form to enhance federal cybersecurity (Industrial Cyber) The Rise of AI Worms in Cybersecurity (Security Boulevard) South Korean detained earlier this year is accused of espionage in Russia, state news agency says (Associated Press)  Massive cyberattacks hit French government agencies (Security Affairs) ODNI appoints new election security leader ahead of presidential race (The Record) Google's self-designed office swallows Wi-Fi “like the Bermuda Triangle” ( Ars Technica) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

The Tech Blog Writer Podcast
2825: Celebrating Women's Influence on International Women's Day With CyberArk

The Tech Blog Writer Podcast

Play Episode Listen Later Mar 8, 2024 21:52


In a world where the digital landscape is continually evolving, how do we ensure that women's voices are heard and valued, especially in the tech sector? This International Women's Day, join us on Tech Talks Daily Podcast as we sit down with Eduarda Camacho, the dynamic COO of CyberArk, a global leader in identity security. From facing doubts about her potential in tech due to her gender, nationality, and non-engineering background to ascending to the executive ranks and making a significant impact, Eduarda's journey is nothing short of inspiring. In this candid conversation, Eduarda shares the challenges and triumphs of her career, offering invaluable advice to women navigating the tech industry. She emphasizes the importance of staying authentic, seeking support when necessary, and the power of perseverance. But Eduarda's insights don't stop there. As the new COO of CyberArk, she outlines her vision and goals for the company, focusing on driving customer value, expanding platform adoption, and gearing the organization for growth and scalability. We also delve into CyberArk's latest groundbreaking research, revealing that women are more concerned than men about the use of AI by cybercriminals to compromise their digital identities. Eduarda explores why women perceive their digital assets like social media profiles and personal photos as more integral to their identity and why they feel more vulnerable to AI-powered impersonation attacks. This discussion opens up a broader conversation on the gendered dimensions of cybersecurity and the critical need for more inclusive strategies to combat evolving digital threats. Eduarda's commitment to fostering diversity and inclusion in cybersecurity is a testament to her belief in the strength of diverse perspectives. As we navigate the complexities of AI in cyberattacks, Eduarda's leadership at CyberArk signifies a hopeful step toward a more secure and inclusive digital future. Why do these gendered perceptions and concerns around cybersecurity exist, and what can we do to address them? Join us as Eduarda Camacho shares her expertise, experiences, and the proactive measures CyberArk is taking to stay ahead of cyber threats in an AI-driven world. Share your thoughts and join the conversation about women's role in shaping the future of technology and cybersecurity. How can we further empower women in the tech industry and ensure their security concerns are addressed? Share your thoughts with us and let's continue the conversation.