CyberArk: How to Navigate Identity, AI, and Threat Detection

Secure identity management — especially machine identity management — is critical for developers in the age of artificial intelligence. In this Dark Reading Fast Chat, CyberArk’s Amy Blackshaw explains why.

Identities continue to be one of the most targeted vectors on the threat landscape — both machine identities and human ones — and cloud computing ensures that such identities will continue to proliferate. In this Dark Reading Fast Chat, Amy Blackshaw, vice-president of product marketing at CyberArk, discusses with Dark Reading's Terry Sweeney how organizations can tap the processing power and speed of artificial intelligence to automate all the associated management processes to keep identities secure.

Blackshaw addresses why organizations should be implementing identity threat detection and response (ITDR) and addresses what organizations should be considering as part of their ITDR strategy. Bradshaw describes strategies that leverage AI to pinpoint anomalous use or risky user behavior, not just within a specific environment but across the entire enterprise. And she makes the case for a layered approach to security management for overcoming blind spots or disconnects among siloed applications or development environments.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights