How to Find Service Accounts in Active Directory: A Comprehensive Guide

| | Blog
Service accounts are a critical component of any enterprise environment, used to perform a variety of automated processes. However, these accounts can pose a significant security risk if not properly managed and monitored. In this article, we will explore how to find service accounts in Active Directory (AD) and discuss ... Read More

Why AI Needs Good Governance

As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology (NIST) has provided essential guidance since 2014 with its Cybersecurity Framework. This year, NIST releases Version 2.0 of ... Read More

How Silverfort Can Help Organizations Align with NIST’s Cybersecurity Framework Version 2.0

As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology (NIST) has provided essential guidance since 2014 with its Cybersecurity Framework. This year, NIST releases Version 2.0 of ... Read More
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud

Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more traditional ransomware attacks is that at a certain point attackers were able to leverage their domain dominance of ... Read More

Attention CISOs: Closing Your Identity Protection Gaps is Urgent

Here’s something that won’t be news to you: The identity attack surface is exposed to attacks. But what about your own organization? Do you know where your specific protection gaps are? A new report released by Osterman Research, entitled “The State of the Identity Attack Surface,” reveals the full extent ... Read More

How Silverfort Helps Law Enforcement Comply With Advanced Authentication

Keeping critical information safe from cybercriminals is an imperative for every organization, but none more so than the law enforcement agencies that maintain large volumes of highly sensitive data. This is why the Federal Bureau of Investigation (FBI) recently introduced strict new requirements for accessing its Criminal Justice Information Services ... Read More

Why Ransomware Has Become a Major Identity Threat

Ransomware continues to plague organizations around the world, with more than 493.3 million attacks detected in 2022. Despite a proliferation of products in the security stack, companies keep falling victim to these attacks, paying an average of $812,360 in ransom demands. And the total cost to an organization is estimated ... Read More

How Silverfort Solves the Toughest Challenges of Privileged Access Management

The standard way of addressing security issues that stem from an organization’s privileged user accounts is with a privileged access management (PAM) solution, which can be a very effective tool against threats that target admin credentials. However, when it comes to fully implementing PAM there are often significant challenges around ... Read More

Uncovering the Hidden Risks of Mobile Device Security

Organizations often encounter issues when trying to implement best practices in mobile device security while also ensuring a seamless user experience. This is because end users can be hesitant to install additional apps on their mobile device, while others engage in risky practices such as jailbreaking or rooting their phones, ... Read More

Five Reasons Why Silverfort is the Perfect First Step on Your Zero Trust Journey

Zero Trust has traditionally been thought of in the context of a network, with implementation considered a project primarily focused on upgrading and segmenting legacy infrastructure. As long as the access to all physical assets was controlled, the thinking went, that could act as a proxy for extending trust in ... Read More