Why It’s Time to Take an Identity-First Approach to Security
In this video interview, Khizar Sultan of CyberArk, discusses how agencies can adopt an identity-first approach to cybersecurity.
In this video interview, Khizar Sultan of CyberArk, discusses how agencies can adopt an identity-first approach to cybersecurity.
In today’s threat environment, where ransomware and other attacks aim to steal and exploit user credentials, a focus on identity “is the first step in securing state and local systems,” said James Imanian, Senior Director, U.S. Federal Technology Office at CyberArk. Yet many state and local IT teams struggle to implement strong identity controls.
“While cyberattacks are inevitable, negative business impact is not.”
By secrets, we don’t mean your friend’s surprise party or an old family recipe.
When agencies go to the cloud with grandiose expectations, security’s job is straightforward: Keep everything safe, and stay out of the way.
The problem has been that traditional security solutions lacked the flexibility needed to adapt to changing requirements, but that mindset is changing.
“Privileged access can be exploited and used to gain access to sensitive data,” said Jermyn. “We’ve seen time and time again, attackers will get into the network. It’s not about keeping them out; it’s about limiting what they can do once they are in the network. How do we stop them from escalating privileges and… Read more »