How to Find Service Accounts in Active Directory: A Comprehensive Guide

| | Blog
Service accounts are a critical component of any enterprise environment, used to perform a variety of automated processes. However, these accounts can pose a significant security risk if not properly managed and monitored. In this article, we will explore how to find service accounts in Active Directory (AD) and discuss ... Read More

Why AI Needs Good Governance

As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology (NIST) has provided essential guidance since 2014 with its Cybersecurity Framework. This year, NIST releases Version 2.0 of ... Read More

How Silverfort Can Help Organizations Align with NIST’s Cybersecurity Framework Version 2.0

As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology (NIST) has provided essential guidance since 2014 with its Cybersecurity Framework. This year, NIST releases Version 2.0 of ... Read More
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more traditional ransomware attacks is that at a certain point attackers were able to leverage their domain dominance of ... Read More

Attention CISOs: Closing Your Identity Protection Gaps is Urgent

Here’s something that won’t be news to you: The identity attack surface is exposed to attacks. But what about your own organization? Do you know where your specific protection gaps are? A new report released by Osterman Research, entitled “The State of the Identity Attack Surface,” reveals the full extent ... Read More

Importance of CJIS Compliance

If your organization has access to sensitive data from government agencies, you will most likely have to adhere to the Criminal Justice Information Services (CJIS) compliance requirements. In this context, sensitive data, or Criminal Justice Information (CJI), is essentially any information that cannot be publicly disclosed except under certain circumstances ... Read More

Why Ransomware Has Become a Major Identity Threat

Ransomware continues to plague organizations around the world, with more than 493.3 million attacks detected in 2022. Despite a proliferation of products in the security stack, companies keep falling victim to these attacks, paying an average of $812,360 in ransom demands. And the total cost to an organization is estimated ... Read More

How Silverfort Solves the Toughest Challenges of Privileged Access Management

The standard way of addressing security issues that stem from an organization’s privileged user accounts is with a privileged access management (PAM) solution, which can be a very effective tool against threats that target admin credentials. However, when it comes to fully implementing PAM there are often significant challenges around ... Read More

Uncovering the Hidden Risks of Mobile Device Security

Organizations often encounter issues when trying to implement best practices in mobile device security while also ensuring a seamless user experience. This is because end users can be hesitant to install additional apps on their mobile device, while others engage in risky practices such as jailbreaking or rooting their phones, ... Read More

Five Reasons Why Silverfort is the Perfect First Step on Your Zero Trust Journey

Zero Trust has traditionally been thought of in the context of a network, with implementation considered a project primarily focused on upgrading and segmenting legacy infrastructure. As long as the access to all physical assets was controlled, the thinking went, that could act as a proxy for extending trust in ... Read More