Bert Blevins


Bert Blevins press releases

  • Houston, Texas – March 16, 2025 –Law firms handle some of the most sensitive and high-value data in the world—confidential client information, intellectual property, case strategies, and financial records. But with cyber threats escalating and regulatory frameworks tightening, firms that lack robust security measures risk not just data breaches but also client trust, compliance violations, and reputational damage. For medium-sized and large law firms, Privileged Access Management...

  • Houston, Texas – March 15, 2025 – In today’s hyper-connected world, Operational Technology (OT) serves as the backbone of critical infrastructure, including power grids, manufacturing systems, water treatment plants, and transportation networks. As these systems increasingly become digitized, they also face an escalating threat from cybercriminals. With OT environments differing significantly from traditional IT networks, specialized security measures are required to ensure their...

  • Houston, Texas – March 13, 2025 – As cyber threats become more sophisticated, securing digital identities is no longer optional—it’s essential. In a new LinkedIn post, cybersecurity expert Bert Blevins explores how the Delinea Identity Threat Solution is reshaping identity security, helping organizations stay ahead of cybercriminals. Why Identity Security Matters Now More Than Ever In today’s rapidly evolving digital landscape, identity-based attacks are at an all-time...

  • Houston, Texas – March 12, 2025 – Understanding identity management is more crucial than ever as organizations navigate the complexities of digital security and compliance. In a recent LinkedIn post, Bert Blevins, a leading expert in identity and access management, breaks down the key differences and synergies between Identity Governance and Administration (IGA) and Identity Lifecycle Management (ILM). IGA vs. ILM: What’s the Difference? IGA focuses on enforcing policies, ensuring...

  • Houston, Texas – March 10, 2025 – In an era of escalating cyber threats and rapidly evolving IT infrastructures, Privileged Access Management (PAM) has emerged as a critical pillar of cybersecurity. As organizations embrace cloud adoption, zero-trust architectures, and AI-driven security, the way privileged access is managed is undergoing a profound transformation. Bert Blevins, cybersecurity expert and founder of BertBlevins.com, delves into the future of PAM in a new LinkedIn...

  • Houston, Texas – March 10, 2025 – – In today’s fast-paced digital landscape, businesses rely on Microsoft’s Power Platform to build, automate, and secure workflows more efficiently than ever. However, maximizing its security capabilities requires a deeper understanding of the platform's inner workings—an area where PowerShell proves to be a critical asset. BertBlevins.com is excited to announce a groundbreaking approach to retrieving security insights from Microsoft...

  • Houston, Texas – March 8, 2025 – In today’s increasingly complex cyber landscape, securing cyber insurance is no longer a routine checkbox exercise. Insurance providers are tightening their requirements, demanding organizations implement robust security measures—with a key focus on Privileged Access Management (PAM). "Compromised privileged credentials remain one of the leading causes of costly data breaches," said Bert Blevins, cybersecurity expert and founder of BertBlevins...

  • Houston, Texas – March 7, 2025 – When administrators log into servers, every action carries weight—especially mistakes. A simple misstep, whether it’s using weak credentials, skipping multi-factor authentication, or logging in from an unsecured device, can open the door to security breaches, compliance violations, and costly downtime. These errors aren’t just technical slip-ups; they have real business implications, from financial losses to reputational damage. Bert...

  • Houston, Texas – March 6, 2025 – In today’s rapidly evolving threat landscape, unmanaged privileged access poses a significant security risk to enterprises. Cybercriminals actively target privileged accounts to infiltrate networks, exfiltrate sensitive data, and disrupt operations. To combat this growing threat, BertBlevins.com is emphasizing the importance of implementing a robust Enterprise Privileged Access Management (PAM) strategy. Bert Blevins, cybersecurity expert and founder...

  • Houston, TX – March 5, 2025 – In today’s digital landscape, securing privileged credentials is more crucial than ever. Bert Blevins, a cybersecurity expert and spokesperson for BertBlevins.com, is raising awareness about the alarming statistic that 80% of data breaches are a result of compromised privileged credentials. To help organizations understand how to protect their sensitive data, BertBlevins.com emphasizes the critical role that Privileged Access Management (PAM) solutions...

  • Houston, Texas – March 4, 2025 – For years, Linux users have enjoyed the power of sudo, the ultimate command for executing tasks with elevated privileges. Now, Windows users can rejoice as Microsoft is finally catching up! With the latest updates, Windows has introduced native sudo support, marking a significant leap forward for developer workflows, security, and administrative efficiency. This new feature promises to streamline everyday tasks and bring a more intuitive and secure way to...

  • Houston, Texas – March 3, 2025 – As artificial intelligence (AI) continues to revolutionize cybersecurity, organizations face an urgent challenge—securing AI-driven processes and non-human identities. AI systems require privileged access to vast datasets, automation tools, and critical infrastructure, making them prime targets for cyber threats. Without robust security controls, AI can become both a vulnerability and a weapon for attackers. To address this growing concern, BertBlevins...

  • Houston, Texas – March 3, 2025 – As artificial intelligence (AI) continues to reshape cybersecurity, organizations are grappling with a new challenge—securing AI-driven processes and non-human identities. AI systems require privileged access to vast datasets, automation tools, and critical infrastructure, making them prime targets for cyber threats. Without robust security controls, AI can quickly turn from an asset into a vulnerability. BertBlevins.com is addressing this critical...

  • Houston, Texas – March 1, 2025 – In today’s ever-evolving cyber battleground, privileged accounts remain prime targets for attackers seeking unauthorized access to critical systems. Recognizing this growing threat, cybersecurity expert Bert Blevins, founder of BertBlevins.com, has released a new LinkedIn post outlining the seven essential Privileged Access Management (PAM) best practices that every enterprise must adopt to safeguard against cyber threats. “Privileged credentials...

  • Houston, Texas – February 28, 2025 – In today’s rapidly evolving cyber landscape, protecting privileged accounts is more critical than ever. Bert Blevins, cybersecurity expert and founder of BertBlevins.com, is shedding light on this pressing issue in his latest LinkedIn post, where he details seven essential Privileged Access Management (PAM) practices that every security-conscious enterprise must implement. "Privileged accounts are the golden keys that attackers relentlessly...

  • Houston, Texas – February 28, 2025 –Implementing a Privileged Access Management (PAM) solution is a crucial step in protecting sensitive accounts from cyber threats. However, poor execution can create security gaps, disrupt operations, and lead to user resistance. Bert Blevins, an expert in cybersecurity and identity management, warns organizations about the potential pitfalls of PAM implementations in his latest LinkedIn post. In "10 Signs Your PAM Implementation Is Headed for...

  • Houston, Texas – February 28, 2025 – BertBlevins.com is thrilled to announce an exclusive FREE PAM Bootcamp, designed to help IT and security professionals master Privileged Access Management (PAM) in just one hour. Hosted by industry expert Bert Blevins, this power-packed session will equip participants with essential PAM knowledge, real-world insights, and future trends—all from the comfort of their own device. Event Details: Who: Bert Blevins, PAM and cybersecurity...

  • Houston, Texas – February 28, 2025 – Cybersecurity conversations often revolve around external hackers, but what if the biggest threats are already inside your organization? Bert Blevins, cybersecurity expert and founder of BertBlevins.com, is shedding light on the overlooked dangers of insider threats—both intentional and accidental. In a recent LinkedIn post, Blevins explores how insiders—such as disgruntled employees or negligent contractors—pose a significant risk due...

  • Houston, Texas – February 26, 2025 – Stepping into the world of Privileged Access Management (PAM) can be a daunting task, especially for newcomers responsible for handling high-level accounts with elevated permissions. Bert Blevins, a trusted authority in cybersecurity and privileged access strategies, is shedding light on the most common bad habits that new PAM users develop—and, more importantly, how to break them before they put an organization at risk. In his latest LinkedIn...

  • Houston, Texas – February 26, 2025 – Stepping into the world of Privileged Access Management (PAM) can be a daunting task, especially for newcomers responsible for handling high-level accounts with elevated permissions. Bert Blevins, a trusted authority in cybersecurity and privileged access strategies, is shedding light on the most common bad habits that new PAM users develop—and, more importantly, how to break them before they put an organization at risk. In his latest LinkedIn...