Re-Imagining How we Approach Workforce Identity Security

August 11, 2025

Because today's workforce - where and how it works - is unique, so, too, must be the identity security controls to protect it. Archit Lohokare of CyberArk opens up on the use of intelligent privilege controls in re-imagining how we approach the challenge of workforce identity security. 

In this video interview with Information Security Media Group, Lohokare also discussed: 

Today's potential identity attack surface; 

Why we need to re-imaging workforce identity security; 

The constituencies that need to be managed in this new dynamic. 

Make sure to check out the other videos in this Executive Series: 
Re-Imagining Identity and Access Management for 2025 with Clarence Hinton 
Reimagining Access Management: The Threat Landscape with Lavi Lazarovitz

Previous Article
Smarter Application Control for Modern Endpoints
Smarter Application Control for Modern Endpoints

See how CyberArk EPM delivers adaptive, identity-centric application controls to stop ransomware, insider t...

Next Article
‘Plague’ malware exploits Pluggable Authentication Module to breach Linux systems
‘Plague’ malware exploits Pluggable Authentication Module to breach Linux systems

Understanding the ‘Plague’ Pluggable Authentication Module (PAM*) backdoor in Linux systems ‘Plague’ repres...