Posts By Candace Thorson

Identity Protection Starts With Privileged Access Management

In this video interview, Kevin E. Green of BeyondTrust explores how an identity-centric approach to cybersecurity, including a modern privileged access management (PAM) solution, helps agencies secure the paths to privilege that malicious actors try to exploit.

Want to Be a GovLoop Featured Contributor?

It’s that time! Apply to join GovLoop’s 2025 Featured Contributor program — a chance for government and industry professionals to share their knowledge with, and be recognized by, a community of 300,000-plus public-sector employees, industry partners, and other knowledge experts.