CyberArk: How to Navigate Identity, AI, and Threat Detection
Secure identity management — especially machine identity management — is critical for developers in the age of artificial intelligence. In this Dark Reading Fast Chat, CyberArk’s Amy Blackshaw explains why.
June 25, 2024
Identities continue to be one of the most targeted vectors on the threat landscape — both machine identities and human ones — and cloud computing ensures that such identities will continue to proliferate. In this Dark Reading Fast Chat, Amy Blackshaw, vice-president of product marketing at CyberArk, discusses with Dark Reading's Terry Sweeney how organizations can tap the processing power and speed of artificial intelligence to automate all the associated management processes to keep identities secure.
Blackshaw addresses why organizations should be implementing identity threat detection and response (ITDR) and addresses what organizations should be considering as part of their ITDR strategy. Blackshaw describes strategies that leverage AI to pinpoint anomalous use or risky user behavior, not just within a specific environment but across the entire enterprise. And she makes the case for a layered approach to security management for overcoming blind spots or disconnects among siloed applications or development environments.
About the Author
You May Also Like