Federal

  • Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

    Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

    Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...

    Read Article
  • Why You Need a Battle-Tested PAM Solution42:08

    Why You Need a Battle-Tested PAM Solution

    CyberArk experts discuss why you need a battle-tested PAM solution.

    Watch Video
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Article
  • How to Protect Federal Agencies by Securing DevOps, Secrets and Other Non-Human Identities

    How to Protect Federal Agencies by Securing DevOps, Secrets and Other Non-Human Identities

    Learn how CyberArk Secrets Manager and the CyberArk Identity Security Platform can help federal agencies secure human and non-human identities.

    Read More
  • Naval Identity Services: Managing Privileged Access for Users and NPEs24:50

    Naval Identity Services: Managing Privileged Access for Users and NPEs

    Learn how CyberArk, through PEO Digital, can assist with meeting the Navy’s cyber needs.

    Watch Video
  • Secrets Management: Non-Person Entities Have Privilege Too!11:23

    Secrets Management: Non-Person Entities Have Privilege Too!

    Securely authenticate, control and audit how applications and DevOps tools use secrets and privileged credentials to access databases, cloud environments and other sensitive government resources.

    Watch Video
  • Workforce Password Management (WPM): Government Use-Cases10:48

    Workforce Password Management (WPM): Government Use-Cases

    Gov agencies need quick access to a variety of resources. You need confidence it’s them knocking – not an attacker. With Workforce Identity, you can empower your workforce while keeping threats out.

    Watch Video
  • Endpoint Privilege Manager: Un-Privilege the Attacker13:41

    Endpoint Privilege Manager: Un-Privilege the Attacker

    The road to least privilege requires balance. Removing local admin rights to protect against threats is essential – but so is ensuring your government agency and its users remain nimble.

    Watch Video
  • Addressing Zero Trust for Government - The Role Of Identity Security

    Addressing Zero Trust for Government - The Role Of Identity Security

    Governments around the world are enacting stronger cybersecurity mandates in which Zero Trust features as a central theme. Eighty-eight percent of security leaders agree that

    Read More
  • How Identity Security Addresses Key DoD Zero Trust Requirements

    How Identity Security Addresses Key DoD Zero Trust Requirements

    The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...

    Read Article
  • Zero Trust and Identity Security - From Privilege Policy to End User Security28:20

    Zero Trust and Identity Security - From Privilege Policy to End User Security

    With Government providing strategies on improving the nation’s cybersecurity through principles such as Zero Trust, we would like to offer guidance on where agencies cyber priorities should lie

    Watch Video
  • Disruptive DevSecOps 2022 - DevOps for Better Security28:21

    Disruptive DevSecOps 2022 - DevOps for Better Security

    Agencies are continuously updating their software development lifecycles and IT operations. It’s critical for them to maintain a short timeframe during this process to improve workflows.

    Watch Video
  • GovCIO- Enabling End Point Security

    GovCIO- Enabling End Point Security

    The Necessary Tools for Enabling End Point Security

    Read More
  • An Identity Security Approach to NIS2 Readiness

    An Identity Security Approach to NIS2 Readiness

    With its new and improved Network and Information Security Directive, NIS2, the European Union joins a growing list of governments around the world that are enacting stronger cybersecurity...

    Read Article
  • NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    On November 28, 2022, NIS2 officially replaced the European Union’s Network and Information Security (NIS) Directive, heralding significant compliance changes for many EU businesses. This...

    Read Article
  • Enforcing Privilege Access Control26:51

    Enforcing Privilege Access Control

    In this session CyberArk will showcase how to Enforce Privilege Access Controls through CDM.

    Watch Video
  • CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...

    Read Article
  • DGI: Why Zero Trust Starts with Identity Security27:06

    DGI: Why Zero Trust Starts with Identity Security

    This virtual workshop will focus on the fundamentals of Zero Trust highlighting the ‘how to’ and lessons learned to date.

    Watch Video
  • CISO Handbook- Why Zero Trust Starts with Identity Security

    CISO Handbook- Why Zero Trust Starts with Identity Security

    Take a deep dive into efforts at the Army Software Factory, CISA and DISA— particularly at a time that agencies simultaneously want to deliver more data and services to users at the edge.

    Read More
  • CyberTalks: ICAM and Zero Trust4:31

    CyberTalks: ICAM and Zero Trust

    Troy Grubbs, Federal Sales Director, CyberArk, spoke on ICAM and Zero Trust at CyberScoop's CyberTalks

    Watch Video
  • loading
    Loading More...