Kubiya.ai announces the launch of its DevOps Digital Agents.
CyberArk announced the CyberArk Blueprint for Privileged Access Management Success, designed to help customers take a future-proof, phased and measurable approach to reducing privilege-related risk.
Based on the experience of the CyberArk Labs, Red Team and incident response engagements, nearly every targeted attack follows a similar pattern of privileged credential compromise. Those patterns influenced CyberArk Blueprint’s three guiding principles, which are foundational to the program: prevent credential theft; stop lateral and vertical movement; and limit privilege escalation and abuse.
The CyberArk Blueprint uses a simple, prescriptive approach based on these guiding principles to reduce risk across five stages of privileged access management maturity. Customers adopting cloud, migrating to SaaS, leveraging DevOps and automating with RPA benefit from being able to prioritize quick wins, progressively address advanced use cases, and align security controls to digital transformation efforts across hybrid environments. For example:
- Prevent credential theft: To mitigate internal and external risks, organizations must first prevent theft of critical credentials—such as IaaS admins, domain admins or API Keys—that could be used to conduct network takeover attacks or compromise key infrastructure accounts. By implementing session isolation, hard coded credential removal, and theft detection and blocking strategies, organizations can protect privileged access by humans, applications and across CI/CD pipelines.
- Stop lateral and vertical movement: To stop threat actors from pivoting from non-trusted devices to high-value cloud consoles or domain controllers, this principle focuses on enforcing credential boundaries, just-in-time access and credential randomization to break the cyber attack chain.
- Limit privilege escalation and abuse: To stop adversaries from abusing privileges and to reduce the overall attack surface, it’s important to implement strong least privilege controls, behavioral analytics and adaptive response.
CyberArk Blueprint offers templates and custom roadmap design sessions so organizations of all sizes, including those in both regulated and non-regulated industries, can progressively expand privileged access controls and strategy.
“Simple, yet comprehensive, CyberArk Blueprint offers vendor-neutral guidance that closely aligns privileged access management initiatives with potential risk reduction, helping organizations address their greatest liabilities as quickly as possible,” said Nir Gertner,Chief Security Strategist, CyberArk. “Regardless of an organization’s privileged access management maturity, CyberArk Blueprint enables organizations to future-proof new technology investments while improving security, reducing the attack surface and driving operational efficiencies.”
Industry News
Aviatrix® introduced Aviatrix Distributed Cloud Firewall for Kubernetes, a distributed cloud networking and network security solution for containerized enterprise applications and workloads.
Stride announces the general availability of Stride Conductor, its new autonomous coding product that transforms the software development landscape.
CircleCI unveiled CircleCI releases, which enables developers to automate the release orchestration process directly from the CircleCI UI.
Fermyon™ Technologies announces Fermyon Platform for Kubernetes, a WebAssembly platform for Kubernetes.
Akuity announced a new offer targeted at Enterprises and businesses where security and compliance are key.
New Relic launched new capabilities for New Relic IAST (Interactive Application Security Testing), including proof-of-exploit reporting for application security testing.
OutSystems announced AI Agent Builder, a new solution in the OutSystems Developer Cloud platform that makes it easy for IT leaders to incorporate generative AI (GenAI) powered applications into their digital transformation strategy, as well as govern the use of AI to ensure standardization and security.
Mirantis announced significant updates to Lens Desktop that makes working with Kubernetes easier by simplifying operations, improving efficiency, and increasing productivity. Lens 2024 Early Access is now available to Lens users.
Codezero announced a $3.5 million seed-funding round led by Ballistic Ventures, the venture capital firm dedicated exclusively to funding entrepreneurs and innovations in cybersecurity.
Prismatic launched a code-native integration building experience.
Check Point® Software Technologies Ltd. announced its Check Point Infinity Platform has been ranked as the #1 Zero Trust Platform in the latest Miercom Zero Trust Platform Assessment.
Tricentis announced the launch and availability of SAP Test Automation by Tricentis as an SAP Solution Extension.
Netlify announced the general availability of the AI-enabled deploy assist.
DataStax announced a new integration with Airbyte that simplifies the process of building production-ready GenAI applications with structured and unstructured data.