Public Sector & Government ​

  • What Contractors Need to Know About the Department of Defense’s Insider Threat Program

    What Contractors Need to Know About the Department of Defense’s Insider Threat Program

    Government contractors are required to establish, implement, monitor, and report on the effectiveness of insider threat programs. Learn how to Establish a Foundation for Federal Compliance.

    Read More
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • ZT Fundamentals: Why Zero Trust Starts with Identity Security25:43

    ZT Fundamentals: Why Zero Trust Starts with Identity Security

    The implementation of Zero Trust is a time-consuming process. Here we focus on the ‘How To’ of implementing Zero Trust and the associated lessons learned to date.

    Watch Video
  • How Identity Security Addresses Key DoD Zero Trust Requirements

    How Identity Security Addresses Key DoD Zero Trust Requirements

    The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...

    Read Blog
  • An Identity Security Approach to NIS2 Readiness

    An Identity Security Approach to NIS2 Readiness

    With its new and improved Network and Information Security Directive, NIS2, the European Union joins a growing list of governments around the world that are enacting stronger cybersecurity...

    Read Blog
  • ×

    See CyberArk in action! Schedule a demo today!

    First Name
    Last Name
    Company
    Phone Number
    Job Title
    Role
    Department
    Country
    State
    Postal Code - optional
    Thank you! We will be in touch shortly.
    Error - something went wrong!
  • NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    On November 28, 2022, NIS2 officially replaced the European Union’s Network and Information Security (NIS) Directive, heralding significant compliance changes for many EU businesses. This...

    Read Blog
  • CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    CISA CPG Report IDs Top Cybersecurity Steps for SMB Critical Infrastructure Entities

    The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...

    Read Blog
  • Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harden federal networks and advance key priorities outlined in President Biden’s May 2021...

    Read Blog
  • K-12 Schools in the Crosshairs of Ransomware

    K-12 Schools in the Crosshairs of Ransomware

    If staggering staffing shortages, razor-thin budgets, safety issues and politically driven controversies weren’t enough to contend with, U.S. schools are facing another major crisis: skyrocketing...

    Read Blog
  • Australia’s Growing Focus on Critical Infrastructure Cybersecurity in 2023

    Australia’s Growing Focus on Critical Infrastructure Cybersecurity in 2023

    In recent years, several major cyberattacks targeted critical infrastructure in Australia, including a major telecommunication company, which suffered a devastating data breach in September 2022....

    Read Blog
  • Cybersecurity in a Digitalised World: Where Threats are Coming From and Methods of Effective Defence

    Cybersecurity in a Digitalised World: Where Threats are Coming From and Methods of Effective Defence

    Cybersecurity in a Digitalised World: Where Threats are Coming From and Methods of Effective Defence

    Read More
  • Maximus secures its digital transformation with PAM as a Service

    Maximus secures its digital transformation with PAM as a Service

    Learn how a global and leading government provider mitigates privileged access challenges using CyberArk.

    Read More
  • Addressing the Australian Essential Eight Cyber Security Maturity Model

    Addressing the Australian Essential Eight Cyber Security Maturity Model

    Learn how CyberArk can help address Australia’s cybersecurity Essential Eight risk management model with the CyberArk Identity Security Platform for the government sector.

    Read More
  • Secure Third-Party Access to Protect Water Systems and Critical Operational Technology

    Secure Third-Party Access to Protect Water Systems and Critical Operational Technology

    82 gallons: that’s how much water the average American uses each day. While we should all attempt to minimize our consumption, it’s easy to take the availability of clean, safe water for granted —...

    Read Blog
  • Breaking Down the CMMC and How CyberArk Can Help Support Compliance

    Breaking Down the CMMC and How CyberArk Can Help Support Compliance

    As mobile workforces and cloud service usage continue to surge, organizations are struggling to provide secure, authorized access to their most sensitive information while keeping it out of the...

    Read Blog
  • Access Management Can Help Protect Endpoints

    Access Management Can Help Protect Endpoints

    There are many reasons why security teams have a hard time protecting endpoints from being attacked by ransomware, but modular defenses, such as, privileged access management, can help in the fight.

    Read More
  • Addressing the Department of Defense's Zero Trust Framework with The CyberArk Identity Security Platform

    Addressing the Department of Defense's Zero Trust Framework with The CyberArk Identity Security Platform

    A technical review of how federal agencies can leverage CyberArk Identity Security Solutions to align to the DoD’s Zero Trust Reference Architecture.

    Read More
  • ×

    See CyberArk in action! Schedule a demo today!

    First Name
    Last Name
    Company
    Phone Number
    Job Title
    Role
    Department
    Country
    State
    Postal Code - optional
    Thank you! We will be in touch shortly.
    Error - something went wrong!
  • A Lesson on Higher Education Cybersecurity Risks 

    A Lesson on Higher Education Cybersecurity Risks 

    U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the largest enrollment decline seen in a decade, swirling controversy over reopening physical...

    Read Blog
  • Critical Infrastructure Cybersecurity Gets its Invisible Spotlight

    Critical Infrastructure Cybersecurity Gets its Invisible Spotlight

    While the federal government cannot command private industry, it can provide direction and drive urgency. To this end, the Biden Administration recently issued a new National Security Memorandum...

    Read Blog
  • Mapping CyberArk Solutions to KSA NCA ECC

    Mapping CyberArk Solutions to KSA NCA ECC

    Learn how CyberArk can help meet the Kingdom of Saudi Arabia's NSA Essential Cybersecurity Controls

    Read More
  • Mitigate Risk with Privileged Access Management

    Mitigate Risk with Privileged Access Management

    Federal agencies must modernize their cybersecurity stance with privileged access management and adopt the DOD Zero Trust Reference Architecture that now includes privileged account security.

    Read More
  • loading
    Loading More...