Florin Lazurca, Director of Product Marketing at CyberArk, joined AWS Security LIVE! to explore the shift to 47-day TLS certificate lifespans. Alongside AWS security experts, Florin shares best practices to keep organizations resilient—gaining visibility into all certificates, automating renewals, and embedding certificate management into daily workflows to reduce risk and prevent downtime.
Recommended for You

Credentials are secure. Sessions are not. Learn how to detect and block post-login misuse before it becomes a breach.
 1:01:26
1:01:26Experts unpack best practices and pitfalls to avoid when trying to manage multiple clouds at once
 31:00
31:00Discover who’s really in your cloud—and how to protect developer and data scientist identities without slowing innovation.

As machine identities multiply and vaults sprawl across clouds, visibility becomes your biggest vulnerability.
 28:32
28:32Join CyberArk experts Uzi (VP, Machine Identity Solutions) and Darren (Senior Product Manager) to learn how to eliminate secrets vault sprawl and unify governance across your organization.

CyberArk secures AWS with scoped, time-bound IAM roles, native tool support, and enriched audit logs.

CyberArk secures Azure with just-in-time, role-scoped access, native tool support, and seamless workflows.

Cloud growth has fueled an explosion of machine identities and secrets—often scattered across multiple AWS accounts and unmanaged vaults. The result: vault sprawl, blind spots, and rising compliance

The explosion of machine identities—outnumbering human users by more than 80:1—has created new security challenges for enterprises.

Every role has risks. Who’s Who in the Cloud shows why—and how CyberArk Secure Cloud Access protects every identity without getting in the way.

As cloud-native architectures and microservices expand, machine identities now vastly outnumber human ones, creating a growing security challenge. Traditional static secrets like API keys, passwords,

Cloud roles carry hidden risks. See who’s who in your cloud and how each impacts identity and access security.

CyberArk Whitepaper detailing incident response in cloud security.
CyberArk Privilege Cloud 14.7 improves user experience and enhances security with the new Secure Access space, Identity Protection, Threat Detection, Risk Management and more.

Discover how organizations have evolved from a cloud-first strategy to a cloud-centric one
 20:51
20:51Cloud’s evolution expands risk. Join CyberArk & IDC to explore platform engineering’s role in securing access, managing developer risk, and scaling defenses without slowing innovation.

Fast-moving cloud environments demand speed, but without the right access controls they invite risk. Resources such as virtual machines, containers, and services are created, modified, and...

For many of us, the term “cloud security breach” conjures meticulous attack plans executed by sophisticated criminal syndicates. But in reality, “attacks” can be far more mundane: maybe some...

This document outlines the benefits and process of upgrading from CyberArk PAM Self-Hosted to the CyberArk Identity Security Platform, a cloud-native solution for privileged access management.



