@PaoloLossa Profile picture

paolo lossa

@PaoloLossa

Curious, Team Player, Tennis FUN, Bowie Addicted #CyberArk Country Sales Manager Italy

Joined December 2017
Similar User
David Ambrosin photo

@DavidAmbro

Cinzia Serra photo

@cinziaserra

Stefano Cancian photo

@SCancian

Fabio Zezza photo

@fabio_zzz_74

Giulia Scalfi photo

@GiuliaScalfi1

Stefano Stievanin photo

@sstievan

When it comes to cloud #IdentitySecurity, we can't rely on preconceived notions. It's time to bend the rules and build a programmatic security program, just like #Neo did in the #Matrix. Charles Chu shows us the way! spr.ly/6019OkMfz


Assume breach? Defense in depth? Identity focus? Andy Thompson is bringing all the 🔥🔥🔥 to the Trust Issues podcast! Tune in and learn how to protect your biz like a pro. spr.ly/6016OkM4I

PaoloLossa's tweet image. Assume breach? Defense in depth? Identity focus? Andy Thompson is bringing all the 🔥🔥🔥 to the Trust Issues podcast! Tune in and learn how to protect your biz like a pro. spr.ly/6016OkM4I

Cheers to CyberArk's global partners who were award the Partner of the Year award. See who made the list - spr.ly/6013OkM4l

PaoloLossa's tweet image. Cheers to CyberArk's global partners who were award the Partner of the Year award. See who made the list - spr.ly/6013OkM4l

Who needs secrets when you've got best practices? Follow these tips for managing CI/CD secrets and keep your pipeline artifacts and applications safe.spr.ly/6011OkM41 #IdentitySecurity #CI/CDprotection


Who needs secrets when you've got best practices? Follow these tips for managing CI/CD secrets and keep your pipeline artifacts and applications safe.spr.ly/6012OkM26 #IdentitySecurity #CI/CDprotection


New features alert! We’ve just released enhancements to our enterprise password manager solution. Learn how Workforce Password Management can help Orgs improve security and reduce risk by securing access to high-risk, high-value business applications. spr.ly/6014O3f5w

PaoloLossa's tweet image. New features alert! We’ve just released enhancements to our enterprise password manager solution. Learn how Workforce Password Management can help Orgs improve security and reduce risk by securing access to high-risk, high-value business applications. spr.ly/6014O3f5w

In the second segment of this Evening Standard Tech and Daily podcast @CyberArk’s own White hat Hacker,@hacker_213 , explains the dangers of AI data mining. I listened to it and so should you. Check it out here: spr.ly/6010O3FSE

PaoloLossa's tweet image. In the second segment of this Evening Standard Tech and Daily podcast @CyberArk’s own White hat Hacker,@hacker_213 , explains the dangers of AI data mining. I listened to it and so should you. Check it out here: spr.ly/6010O3FSE

Cyber risks keeping you up at night? Listen to the latest episode of Trust Issues, where Larry Lidz, CISO for @Cisco CX Cloud, discusses how shifting tolerance levels for risk impact security decision-making. spr.ly/6018O3FqE

PaoloLossa's tweet image. Cyber risks keeping you up at night? Listen to the latest episode of Trust Issues, where Larry Lidz, CISO for @Cisco CX Cloud, discusses how shifting tolerance levels for risk impact security decision-making. spr.ly/6018O3FqE

With AI advancing rapidly, staying updated with new cybersecurity skills is more important than ever. Check out our latest blog, where John Walsh discusses the impact of AI in software development and how to verify your results when using AI tools. spr.ly/6017O3FUc


It's not a bird, it's not a plane, it's #QuantumComputing! 🚀 And it's about to change the game for #cybersecurity. @CyberArk's latest blog gives you 4 steps to prepare for this powerful technology and mitigate the risks hackers pose. spr.ly/6017OKYJB #IdentitySecurity


Is this the real life, or is this just a ChatGPT-generated phishing email? 🕶️😵 Cybercriminals are getting more Matrix-level savvy with their tactics. But fear not! An #IdentitySecurity focused strategy can help you dodge those virtual bullets. 🔒💻 spr.ly/6012OKYyy


You may think your #Kubernetes secrets are secure, but you may be missing some critical steps when protecting them from attackers. As #kubecon23 Europe approaches, John Walsh walks through best practices for Kubernetes secrets management. spr.ly/6010OKYHm #IdentitySecurity


Hey developers! ☁️💻 Don't let security rain on your cloud parade! ☔ Check out this review of @CloudNativeFdn's best practices for #cloudnative development and keep your apps secure from ☁️ to 🌞! spr.ly/6014OKYHn


In this thought leadership article, CyberArk's Budiman Tsjin shares what retailers should consider when it comes to delivering a secure retail experience for their customers. spr.ly/601830t7u


Looking to improve visibility, control and management over all secrets across projects and accounts? Then this is your sign to leverage an effective management solution for your cloud-native environments. See how on our blog: spr.ly/601130tAL #Cybersecurity


Fact: the large majority of breaches start with compromised credentials. So how can your organization reduce your risk of an attack? Read our recent blog to explore our four pillars of a modern Identity Security approach. spr.ly/60163vkxm #IdentitySecurity #cybersecurity


Have you ever wondered what it would take to click every link without fear? Dive into our recent blog to discover how enforcing a Zero Trust strategy and raising awareness around phishing can help prevent attacks. spr.ly/60123vkxi #IdentitySecurity #ZeroTrust


Identity Security calls for leadership across categories. @CyberArk is the FIRST and ONLY leader in both Gartner® Magic Quadrant™ reports for Access Management and Privileged Access Management. Download the reports to learn why. spr.ly/601331LoV

PaoloLossa's tweet image. Identity Security calls for leadership across categories. @CyberArk is the FIRST and ONLY leader in both Gartner® Magic Quadrant™ reports for Access Management and Privileged Access Management. Download the reports to learn why. spr.ly/601331LoV

Does your organization fall within the scope of NIS2’s broadened parameters? Take a look at @CyberArk’s most recent blog to review eight #IdentitySecurity steps that can help you improve NIS2 preparations and advance Zero Trust initiatives. spr.ly/601431Llr


United States Trends
Loading...

Something went wrong.


Something went wrong.