In this episode of AWS Security Live! CyberArk joins AWS’s Rob Hale, Principal Security Segment Leader and Margo Cronin, Principal Security and Compliance Specialist Solutions Architect and explore the growing risks developers face as prime targets for cyberattacks due to their elevated access privileges and how implementing a security strategy focused on both enhancing productivity and reducing risk is essential in safeguarding critical systems. Discover how Cyberark addresses these challenges by providing temporary elevated native access secured with Zero Standing Privileges and centralized discovery and management of secrets across AWS accounts, ensuring secure, seamless access to long-lived systems, elastic workloads, and cloud-native services without delays.
Recommended for You

CyberArk secures AWS with scoped, time-bound IAM roles, native tool support, and enriched audit logs.

Cloud growth has fueled an explosion of machine identities and secrets—often scattered across multiple AWS accounts and unmanaged vaults. The result: vault sprawl, blind spots, and rising compliance

CyberArk and Red Hat secure OpenShift Virtualization by uniting VMs and containers, automating ops, and managing machine identities for better security and compliance.

Learn how CyberArk and Palo Alto Networks technology integrations unify security to enforce zero trust, automate SOC workflows, and better protect your entire ecosystem.

Running Kubernetes on Amazon EKS? You’re likely already using cert-manager—the open source standard for TLS and mTLS certificate automation in Kubernetes clusters. Today, we’re excited to announce...
2:40See how modern identity security protects your cloud without compromising speed or control

As organizations modernize IT infrastructure, many are adopting platforms like OpenShift Virtualization to run both traditional virtual machines (VMs) and containerized workloads on a single,...
35:36CyberArk’s Udi Mokady and industry leaders discuss AI, cybersecurity trends and identity governance in a keynote packed with strategic insights.

Discovery how CyberArk and AWS secure identities and sensitive data for manufacturers
44:16Learn how to secure Kubernetes environments and overcome key challenges with insights from CyberArk and Red Hat experts.
21:24Red Hat and CyberArk's new Event-Driven Ansible plug-in automates responses to alerts, saving time and resolving issues faster.

The increasing complexity of generative AI-driven cyberthreats demands a more diligent approach to how organizations detect and respond to these dangers

Unified Defense-in-depth endpoint security with CyberArk Endpoint Privilege Manager and Palo Alto Networks Cortex
28:10How to optimize cloud security for all identities – human and machine – across the enterprise with CyberArk on AWS.

This Gorilla Guide outlines how to protect developers across multiple cloud architectures without impeding their daily workflows.
32:58AI is shaping the evolution of DevSecOps and application security.
37:31How to get a complete view of your exposure, control of your credentials when scanning, and automate your processes to reduce complexity.

Recently, we researched a project on Portainer, the go-to open-source tool for managing Kubernetes and Docker environments. With more than 30K stars on GitHub, Portainer gives you a user-friendly...

The rise of the Internet of Things (IoT) and Operational Technology (OT) devices is reshaping industries, accelerating innovation and driving new efficiencies. However, as organizations...

Easily manage and secure everything your developers access and build in the cloud


