Federal
-
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy
Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...
-
42:08
Why You Need a Battle-Tested PAM Solution
CyberArk experts discuss why you need a battle-tested PAM solution.
-
Ransomware’s PLAYing a Broken Game
Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...
-
How to Protect Federal Agencies by Securing DevOps, Secrets and Other Non-Human Identities
Learn how CyberArk Secrets Manager and the CyberArk Identity Security Platform can help federal agencies secure human and non-human identities.
-
24:50
Naval Identity Services: Managing Privileged Access for Users and NPEs
Learn how CyberArk, through PEO Digital, can assist with meeting the Navy’s cyber needs.
-
11:23
Secrets Management: Non-Person Entities Have Privilege Too!
Securely authenticate, control and audit how applications and DevOps tools use secrets and privileged credentials to access databases, cloud environments and other sensitive government resources.
-
10:48
Workforce Password Management (WPM): Government Use-Cases
Gov agencies need quick access to a variety of resources. You need confidence it’s them knocking – not an attacker. With Workforce Identity, you can empower your workforce while keeping threats out.
-
13:41
Endpoint Privilege Manager: Un-Privilege the Attacker
The road to least privilege requires balance. Removing local admin rights to protect against threats is essential – but so is ensuring your government agency and its users remain nimble.
-
Addressing Zero Trust for Government - The Role Of Identity Security
Governments around the world are enacting stronger cybersecurity mandates in which Zero Trust features as a central theme. Eighty-eight percent of security leaders agree that
-
How Identity Security Addresses Key DoD Zero Trust Requirements
The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...
-
28:20
Zero Trust and Identity Security - From Privilege Policy to End User Security
With Government providing strategies on improving the nation’s cybersecurity through principles such as Zero Trust, we would like to offer guidance on where agencies cyber priorities should lie
-
28:21
Disruptive DevSecOps 2022 - DevOps for Better Security
Agencies are continuously updating their software development lifecycles and IT operations. It’s critical for them to maintain a short timeframe during this process to improve workflows.
-
GovCIO- Enabling End Point Security
The Necessary Tools for Enabling End Point Security
-
An Identity Security Approach to NIS2 Readiness
With its new and improved Network and Information Security Directive, NIS2, the European Union joins a growing list of governments around the world that are enacting stronger cybersecurity...
-
NIS2 to Boost Cybersecurity Requirements for Many EU Businesses
On November 28, 2022, NIS2 officially replaced the European Union’s Network and Information Security (NIS) Directive, heralding significant compliance changes for many EU businesses. This...
-
26:51
Enforcing Privilege Access Control
In this session CyberArk will showcase how to Enforce Privilege Access Controls through CDM.
-
CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities
The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...
-
27:06
DGI: Why Zero Trust Starts with Identity Security
This virtual workshop will focus on the fundamentals of Zero Trust highlighting the ‘how to’ and lessons learned to date.
-
CISO Handbook- Why Zero Trust Starts with Identity Security
Take a deep dive into efforts at the Army Software Factory, CISA and DISA— particularly at a time that agencies simultaneously want to deliver more data and services to users at the edge.
-
4:31
CyberTalks: ICAM and Zero Trust
Troy Grubbs, Federal Sales Director, CyberArk, spoke on ICAM and Zero Trust at CyberScoop's CyberTalks
- Loading More...