Posts Tagged: Pam

Identity Protection Starts With Privileged Access Management

In this video interview, Kevin E. Green of BeyondTrust explores how an identity-centric approach to cybersecurity, including a modern privileged access management (PAM) solution, helps agencies secure the paths to privilege that malicious actors try to exploit.

2.0 — It’s Not Just the Feds

Earlier this week I brokered a conversation between two people I knew would hit it off. Pam Broviak is an online publisher, Director of Public Works for LaSalle, Illinois and a leading thinker about Government 2.0 at the local level. She put together a few months ago a group called MuniGov 2.0, which already boastsRead… Read more »