Posts Tagged: identity security

Identity Protection Starts With Privileged Access Management

In this video interview, Kevin E. Green of BeyondTrust explores how an identity-centric approach to cybersecurity, including a modern privileged access management (PAM) solution, helps agencies secure the paths to privilege that malicious actors try to exploit.

How Identity Drives Security in State & Local Government

In today’s threat environment, where ransomware and other attacks aim to steal and exploit user credentials, a focus on identity “is the first step in securing state and local systems,” said James Imanian, Senior Director, U.S. Federal Technology Office at CyberArk. Yet many state and local IT teams struggle to implement strong identity controls.