Whole-of-State Cybersecurity: A Unified Approach to Protecting Government
In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government...
Read Blog
CyberArk 2024 Identity Security Public Sector Threat Landscape Infographic
The CyberArk 2024 Identity Security Threat Landscape Infographic for Public Sector, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
Read More
Partnering with You to Build the Future of CyberArk Workforce Identity
To best fortify your organization against evolving threats, while meeting compliance and building a sustaining identity security program, we’ve identified three key areas of focus.
Read Blog
The Role of FedRAMP in Federal Agency Digital Transformation and Cybersecurity
Not too long ago, when I was designing, building, operating and defending networks, the government organizations I worked with were burdened with many tasks related to deploying a new capability....
Read Blog
CyberArk SaaS Solutions Achieve FedRAMP® High Authority
I’m honored to share that CyberArk is FedRAMP® High Authorized and ready to support U.S. federal agencies in securing access to critical government data and systems, meeting Zero Trust mandates...
Read Blog
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy
Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...
Read Blog
Ransomware’s PLAYing a Broken Game
Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...
Read Blog
CyberArk Privileged Access Manager Self-Hosted V14.0 - 40+ Customer Enhancement Requests
Explore CyberArk PAM SH V14’s new features: Increased risk reduction, SAML for PSM for SSH sessions, advanced threat analytics and improved mobile experience.
Read Blog