Bert Blevins
Bert Blevins press releases
-
Houston, Texas – February 23, 2025 – In an increasingly complex cybersecurity landscape, Privileged Access Management (PAM) has become a cornerstone for organizations looking to protect their most sensitive assets. However, as cyber threats continue to evolve, PAM is no longer just about vaulting credentials and enforcing least privilege policies. Enter the fringe aspects of PAM. These specialized features extend beyond traditional PAM capabilities to address emerging security challenges...
-
Houston, Texas — February 22, 2025 — In today’s fast-paced digital landscape, businesses are constantly looking for ways to improve IT efficiency and security. But when it comes to privileged access management (PAM), many organizations are still asking: “What’s the big deal?” According to Bert Blevins, the expert behind BertBlevins.com, PAM is more than just a buzzword—it's a game-changer for both IT operations and the bottom line. "Think of PAM as the ultimate...
-
Houston, Texas — February 22, 2025 — As the digital world continues to grow, so does the need for robust cybersecurity solutions. The global Privileged Access Management (PAM) market is set to reach an impressive $20 billion by 2030. That’s a lot of zeros—and a lot of opportunity for businesses to protect their most valuable assets. In today’s fast-paced digital landscape, where cyber threats evolve faster than the latest binge-worthy series, organizations are scrambling...
-
Houston, Texas — February 22, 2025 — BertBlevins.com is proud to announce the release of a new document on Privileged Access Management (PAM) implementation. In today’s complex cyber-security landscape, planning your PAM use cases is as crucial as having a GPS for a cross-country road trip. Bert Blevins, the company’s leading cybersecurity expert, offers a step-by-step guide to help IT professionals navigate the often-turbulent terrain of PAM implementation. This comprehensive...
-
Houston, Texas — February 22, 2025 — At BertBlevins.com, we understand the importance of safeguarding sensitive information, and today, we’re drawing a critical comparison that every business leader should consider: the difference between storing passwords in a basic vault and securing them with Privileged Access Management (PAM). Imagine this: You Walk into a vault with the most precious item you own—your password. Placing it in a regular password storage system is akin to...
-
Houston, Texas — February 22, 2025 — In the world of cybersecurity, Privileged Access Management (PAM) is often seen as a critical tool in protecting sensitive information and systems. But according to Bert Blevins, cybersecurity expert and founder of BertBlevins.com, even the most sophisticated PAM solutions can sometimes lead to unexpected challenges. In a recent LinkedIn post, Bert shared an insightful take on the complexities of PAM, emphasizing how even with a well-implemented...
-
Houston, Texas — February 22, 2025 — BertBlevins.com is pleased to announce the release of Securing and Optimizing Power Apps and Power Automate, a comprehensive guide that addresses the critical aspects of securing and optimizing Microsoft Power Apps and Power Automate. This book is designed for Power Platform admins, developers, and business users who want to enhance the security, scalability, and performance of their automation workflows. With organizations increasingly relying on Power...
-
Houston, Texas — February 22, 2025 — In today’s fast-evolving digital landscape, Privileged Access Management (PAM) has become an essential component of any robust cybersecurity strategy. Despite the critical importance of PAM in protecting against cyber threats, insider risks, and ensuring compliance, many organizations still fall victim to common mistakes that undermine their security efforts. These errors leave businesses exposed to breaches, data leaks, and operational...
-
Houston, Texas – February 21, 2025 – Managing Privileged Access Management (PAM) can often feel like navigating a cybersecurity minefield, but BertBlevins.com is here to make it easier with the release of a comprehensive guide featuring 100 essential PAM activities, tasks, actions, and procedures. This list is designed to keep organizations secure, compliant, and—most importantly—prevent chaos from reigning when those urgent access requests start piling up. Whether you’re...
-
Houston, Texas – February 21, 2025 – Navigating NIST security controls can often feel like deciphering an ancient cybersecurity manuscript—complex, detailed, yet absolutely essential for protecting your organization. But what if there was a streamlined approach to achieving compliance and enhancing security? BertBlevins.com is shedding light on how Privileged Access Management (PAM) serves as a powerful tool to align with the NIST Cybersecurity Framework (CSF) and 800-53 controls. As...
-
Houston, Texas – February 21, 2025 – As the regulatory landscape continues to evolve, businesses are facing new challenges in maintaining compliance with the New York Department of Financial Services (NYDFS) cybersecurity regulations. To help organizations stay ahead, BertBlevins.com has released an insightful 13-minute podcast featuring expert guidance on the latest NYDFS compliance updates, emerging trends, and best practices for 2024. In this must-listen virtual podcast, Bert Blevins, a...
-
Houston, Texas – February 21, 2025 – As cloud infrastructures continue to expand and evolve, organizations face increasing challenges in managing access permissions and entitlements across cloud environments. BertBlevins.com, a leader in cloud security insights, is shedding light on the importance of Cloud Infrastructure Entitlement Management (CIEM) in safeguarding cloud assets. In a recent LinkedIn post (read here), Bert Blevins, a recognized expert in cloud security, emphasized how CIEM...
-
Houston, Texas – February 21, 2025 – As cloud infrastructures continue to expand and evolve, organizations face increasing challenges in managing access permissions and entitlements across cloud environments. BertBlevins.com, a leader in cloud security insights, is shedding light on the importance of Cloud Infrastructure Entitlement Management (CIEM) in safeguarding cloud assets. In a recent LinkedIn post (read here), Bert Blevins, a recognized expert in cloud security, emphasized how CIEM...
-
Houston, Texas – February 21, 2025 – As cloud infrastructures continue to expand and evolve, organizations face increasing challenges in managing access permissions and entitlements across cloud environments. BertBlevins.com, a leader in cloud security insights, is shedding light on the importance of Cloud Infrastructure Entitlement Management (CIEM) in safeguarding cloud assets. In a recent LinkedIn post (read here), Bert Blevins, a recognized expert in cloud security, emphasized how CIEM...
-
Houston, Texas – February 21, 2025 – Microsoft kicked off February with a surprise update to its sign-in process, sparking conversations about the ever-present trade-off between convenience and security. As professionals settle into the new year, adjusting to these authentication changes has become a hot topic. In a new LinkedIn post titled "Convenience vs Security: Microsoft’s New Sign-In Changes Explained," Bert Blevins, founder of BertBlevins.com, dives into Microsoft’s...
-
Houston, Texas – February 21, 2025 – Organizations investing in Microsoft’s E5 license may assume they have all the security tools necessary to protect their privileged accounts—but do they? In his latest LinkedIn post, Bert Blevins, cybersecurity expert and founder of BertBlevins.com, clears up the common misconception that an E5 license is equivalent to a Privileged Access Management (PAM) solution. "An E5 license is NOT a PAM solution," says Blevins. "Yes, it offers advanced...
-
Houston, Texas – February 21, 2025 – In an era where cyber threats are growing in sophistication and frequency, businesses can no longer afford to treat cybersecurity as a secondary concern. Bert Blevins, founder of BertBlevins.com, underscores this pressing issue in a recent LinkedIn post, highlighting why every organization needs a strong cybersecurity team to protect its operations and sensitive data. “Cybersecurity isn’t just an IT issue—it’s a business...
-
Houston, Texas – February 20, 2025 – In today’s digital landscape, a Privileged Access Management (PAM) solution is more than just a password manager—it’s the fortress protecting your enterprise’s most sensitive assets. But are you truly leveraging its full potential? At BertBlevins.com, we believe that a PAM solution should be more than a static vault. When properly implemented, it becomes a strategic powerhouse, strengthening security and streamlining operations...
-
Houston, Texas – February 20, 2025 – BertBlevins.com is excited to unveil a must-read guide for organizations navigating ISO 27001 compliance and Privileged Access Management (PAM) best practices. Security and compliance go hand in hand, but understanding exactly how PAM aligns with ISO 27001 is key to reducing risk—not just ticking checkboxes. Bert Blevins, founder of BertBlevins.com, takes a deep dive into this critical topic in his latest LinkedIn post, offering a visual mapping of...
-
Houston, Texas – February 20, 2025 – In a world where cybersecurity can feel as dry as a compliance manual, Bert Blevins is flipping the script. At BertBlevins.com, Privileged Access Management (PAM) isn't just a security necessity—it's an engaging, AI-powered experience that’s changing the game. Blevins has cracked the code on making PAM as binge-worthy as your favorite streaming series. How? With a dynamic mix of AI-driven content, a mind-blowing 297 blog sites...

