The Kingdom of Saudi Arabia's National Cybersecurity Authority developed the Essential Cybersecurity Controls (ECC – 1: 2018) after conducting a comprehensive study of multiple national and international cybersecurity frameworks and standards meant to enhance the cybersecurity posture of its government institutions and the businesses operating in their territory. Identity Security is a key element within this framework and this whitepaper is meant to help cybersecurity experts understand how CyberArk can help meet these guidelines.
U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the la...
Recommended for You
Cybersecurity in a Digitalised World: Where Threats are Coming From and Methods of Effective Defence
Learn how a global and leading government provider mitigates privileged access challenges using CyberArk.
Learn how CyberArk can help address Australia’s cybersecurity Essential Eight risk management model with the CyberArk Identity Security Platform for the government sector.
As mobile workforces and cloud service usage continue to surge, organizations are struggling to provide secure, authorized access to their most sensitive information while keeping it out of the...
There are many reasons why security teams have a hard time protecting endpoints from being attacked by ransomware, but modular defenses, such as, privileged access management, can help in the fight.
A technical review of how federal agencies can leverage CyberArk Identity Security Solutions to align to the DoD’s Zero Trust Reference Architecture.
U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the largest enrollment decline seen in a decade, swirling controversy over reopening physical...
Federal agencies must modernize their cybersecurity stance with privileged access management and adopt the DOD Zero Trust Reference Architecture that now includes privileged account security.
The CyberArk Blueprint provides a prescriptive framework for state and local governments to secure the new identity perimeter.
IT modernization in the federal government sector is more than just plugging in new technology. It’s about changing the way government workers operate to be more efficient, effective, and...
Sometimes, it takes a significant event — a “forcing function” — to catalyze significant change. It can even take more than one. A series of cyber attacks with real-world implications and...
Barak Feldman, SVP and Thomas Fikentscher, Regional Director at CyberArk discuss security in transformation with - Alastair MacGibbon former cyber security advisor to the Prime Minster of Australia.
Mike Trovato, Managing Director at Information Integrity Solutions and Thomas Fikentscher, Regional Director at CyberArk, discuss Navigating Privacy and Law.
The recent SolarWinds Senate hearing and a flurry of subsequent briefings have unearthed new questions around the attack, which acting director of the U.S. Cybersecurity and Infrastructure Agency...
Prof. Richard Buckland, professor of Cybercrime from UNSW and Bruce Nixon, Partner Manager at CyberArk discuss scaling cyber skills and the availability of skilled cyber professionals in Australia.
We still don’t have a complete picture of what exactly happened during the SolarWinds attack in 2020, nor do we know the full extent yet of the damage or what the long-term impact may be....
Lani Refiti, Co-Founder and CEO at IoTSec Australia and Jeffery Kok, VP of Solution Engineers at CyberArk discuss the rapid expansion of IoT capability and the arrival of 5G in Australia.
Matt Tett, Managing Director at Enex TestLab and Andrew Slavkovic, Solutions Engineering Manager at CyberArk discuss the approach to IRAP, FedRAMP and other compliance schemes.
CyberArk's ANZ Regional Director, Thomas Fikentscher discusses improving security in 2021 - with more devices, new business models, & a more diversified workforce.
Learn how you can implement and maintain least privilege for AWS, Azure and GCP cloud workloads to meet compliance with regulatory frameworks and industry best practices.