Learn how to combat secret sprawl by identifying hardcoded credentials hidden in pipelines, source code, and configuration files. This video explores how discovery tools provide the necessary context to secure unmanaged secrets and how SPIFFE-based workload identity can eliminate the need for static credentials entirely. Watch to find out how to reduce your attack surface and build a resilient, Zero Trust-ready infrastructure
Recommended for You

CyberArk Certificate Manager is the definitive solution for Certificate Lifecycle Management (CLM). It provides a complete, self-contained platform that automates the discovery, renewal, and...
1:56Learn how to secure access for diverse workloads across cloud, on-premises, and edge environments using a unified identity model. The video explains how SPIFFE provides cryptographically verifiable
1:56Learn how SPIFFE-aware applications replace risky, hard-coded secrets with cryptographically verifiable identities automatically delivered at runtime.
2:13Discover how SPIFFE provides a vendor-neutral specification to transform workload identity security by replacing high-risk, hard-coded secrets with unique cryptographic identities.
2:26Join Emma Talpey and Joe Garcia in this episode of "The Drawing Board" as they dive into Workload Identity 101. Learn how to move away from risky, hard-coded secrets and toward a more secure
33:07The deadline has arrived. As of March 15, 2026, the maximum lifespan for public server TLS certificates has been slashed to 200 days.
30:15Learn how to discover and secure AI agents with the right privilege control.

Learn how Encova Insurance unified secrets governance across vaults with AWS Partner CyberArk to streamline audits, strengthen security, and support cloud-first development.

Cryptographic failures have a knack for turning a quiet weekend into a chaotic, all-hands-on-deck emergency. Consider the SHA-1 to SHA-2 deprecation, sometimes referred to as “Shapocalypse,” which...
44:14Discover what Ponemon’s new 2026 PKI research shows about legacy risks, manual workflows, and how to build a modern, resilient PKI program.

For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices, and rarely drawing executive attention...

10-question executive brief to assess PKI risk, certificate outages, governance gaps, and machine identity readiness across cloud and DevOps.

Modernize PKI and certificate management with automation. Learn why legacy PKI fails at scale and how to fix it with a modern, managed PKI solution.

See the top PKI security trends for 2026: certificate sprawl, outages, compliance confidence, and what high-performing teams do differently.

Benchmark your PKI against industry High Performers with a checklist covering visibility, automation, remediation, scale, and governance.

For the past two years, AI agents have dominated boardroom conversations, product roadmaps, and investor decks. Companies made bold promises, tested early prototypes, and poured resources into...

Checklist to assess modern PKI & certificate management readiness across visibility, governance, automation, crypto-agility, and resilience, so you can modernize with confidence.

Read the executive brief highlighting Gartner insights on PKI and certificate lifecycle management, helping security leaders assess modernization priorities.

New global Ponemon study quantifies PKI risk, outages, and operational strain revealing why PKI modernization is now a business priority.

Modernize certificate and PKI operations with a scalable reference architecture for automation, governance, and crypto-agility across hybrid and cloud environments.

