Jacqueline Hinkson from The Cigna Group shares how machine identity security has transformed their certificate management processes across a large enterprise. By integrating automation and and full visibility into their PKI ecosystem, Cigna has been able to scale operations, reduce failures and outages, and empower internal teams through user-friendly tools and self-service options. Jacqueline highlights the benefits of grouping certificates and shares how Cigna has improved efficiency, reliability, and alignment across their organization with these products.
Recommended for You

Explore how quantum computing reshapes cybersecurity in \"Future-Proofing IAM,\" a webinar featuring experts from Deloitte and CyberArk.

One unmanaged machine identity—whether a TLS certificate, SSH key, code signing certificate, or API secret—that’s all it takes to crash your website, halt transactions, and leave customers...

47-day renewals and quantum threats demand action. Discover how certificate automation ensures compliance and future-proofs digital trust

Do you know why Shai-Hulud should raise your hackles? Unless you’ve spent time on Arrakis in Frank Herbert’s Dune or the npm ecosystem this month, the name Shai-Hulud might not ring a bell. In...

Prepare for shortening TLS certificate lifespans. Download the readiness checklist for four steps to benchmark automation and prevent outages.

Across financial services operations, machine identities play critical roles, but in many organizations, these cryptographic keys, API tokens, certificates, and service accounts remain chronically...

On Security LIVE!, CyberArk showcased how to stay ahead of 47-day TLS renewals with automation in AWS.

Financial cybersecurity has never been a static discipline. Over two decades in this industry, I’ve seen it transform from a compliance checkbox to a cornerstone of business resilience—usually...

Picture this: You’re having your morning coffee when your phone buzzes with the kind of alert that makes security professionals break into a cold sweat. A single API key, leaked on GitHub months...

A webinar to help you prepare for 47-day TLS certificate renewals. Learn to automate cert management, reduce risk, and build a scalable CLM strategy.

With machine identities now vastly outnumbering human ones, traditional identity management is no longer enough.

The quantum threat isn’t theoretical—it’s operational. Quantum computing is rapidly shifting from research to reality, forcing chief information security officers (CISOs) to rethink cryptography,...

Modern applications have undergone a paradigm shift, with containers becoming the default choice for deployment. While their flexibility and scalability are well-recognized, their adoption has...

47-day TLS certificate lifecycles will go into effect in 2029. Manual CLM is no longer feasible. CyberArk offers a free scan to help you prepare.

Automate code signing workflows and ensure your keys never leave secure, encrypted storage with CyberArk Code Sign Manager.

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures...

5 must-ask questions for CISOs as their organization's prepare for 47-day TLS certificate lifespans and the future of certificate management and automation.

Frost & Sullivan applies a rigorous analytical process to evaluate multiple nominees for each Award category before determining the final Award recipient.

The CA/Browser Forum has approved sweeping changes to the TLS certificate lifecycle, reducing the maximum validity for public certificates to just 47 days, down from today’s 398.

Discover how 47-day TLS certificates are reshaping certificate management. Security expert Ryan Hurst explains how to adapt, automate, and secure digital trust.