Transposition française de la directive NIS2 – en matière d’identité, quelles sont les mesures attendues?

| | Compliance
L’ANSSI travaille depuis plusieurs mois sur la transposition de la directive européenne NIS2 en droit français. Récemment, une première ébauche a circulé sur Internet, initialement mise en ligne par LeMagIT, que plusieurs journaux ont décortiqué. En attendant la publication d’une version définitive, ce document fournit déjà une perspective importante sur ... Read More
AD Tiering Made Simple(r)

AD Tiering Made Simple(r)

Active Directory (AD) tiering is nothing new for organizations that need the most secure IT environments, like those in the defense and critical infrastructure spaces. While it is a surprisingly underused approach to partitioning and protecting an organization’s most valuable assets and accounts, it is starting to find its way ... Read More
Beyond Passwords: Why Trusting Password Hygiene Isn’t Enough

Beyond Passwords: Why Trusting Password Hygiene Isn’t Enough

Let’s discuss passwords and identity security. By entering a password that only you know, you are in theory “proving” to a system that you are who you claim to be. They have been widely used in the IT/OT world for a very long time – arguably too long.   To ... Read More
Navigating Retail: Overcoming the Top 3 Identity Security Challenges

Navigating Retail: Overcoming the Top 3 Identity Security Challenges

As retailers compete in an increasingly competitive marketplace, they invest a great deal of resources in becoming household names. But brand recognition is a double-edged sword when it comes to cybersecurity. The bigger your name, the bigger the cyber target on your back. Data breaches in the retail sector cost ... Read More
Unlocking HIPAA Compliance: Navigating Access Control and MFA Guidelines

Unlocking HIPAA Compliance: Navigating Access Control and MFA Guidelines

| | Compliance
As technology continues to revolutionize healthcare operations, protecting patient data has never been more challenging. In the ongoing struggle against data breaches, last year marked a tipping point, as an unprecedented 133 million healthcare records were breached, according to the HIPAA Journal. In this blog, we will delve into the ... Read More
Identity Security in M&A: Gain Visibility into Consolidated Environments with Silverfort 

Identity Security in M&A: Gain Visibility into Consolidated Environments with Silverfort 

When a company intends to acquire another organization through a merger or purchase, it is important to know what security risks could accompany the acquisition. Without this, organizations could open themselves to significant financial and legal challenges.  Following an M&A, IT teams must merge different technologies and resources as the ... Read More
Silverfort Announces New Integration with Microsoft Entra ID EAM 

Silverfort Announces New Integration with Microsoft Entra ID EAM 

Silverfort is excited to announce our integration with external authentication methods (EAM) in Microsoft Entra ID, which is now in public preview. This allows customers to use Silverfort seamlessly with any app or service that relies on Entra ID as an identity provider.  Enhanced MFA and Threat Intelligence  In today’s ... Read More
5 Ways to Step Up Your AD Hygiene with Silverfort  

5 Ways to Step Up Your AD Hygiene with Silverfort  

| | Product Highlights
Active Directory (AD) is the backbone of most organizations’ networks, managing access and authentication for users, devices and applications. While AD provides both users and administrators with central services, its security has not kept pace with growing modern security risks. As a tempting target for threat actors, this is a ... Read More
Mitigating the Identity Risks of Ex-Employees’ Accounts

Mitigating the Identity Risks of Ex-Employees’ Accounts

| | Product Highlights
One of the biggest security weaknesses organizations face is their own employees. This isn’t pleasant, but it is a reality we must accept. When they make mistakes, they open the door to attackers. This is even more true when dealing with the user accounts of previous employees. It’s a common ... Read More
Identity Segmentation: A Key Pillar in Bolstering Security Posture

Identity Segmentation: A Key Pillar in Bolstering Security Posture

As cyber threats evolve, organizations must constantly adapt their identity security strategies to stay protected. One of the most significant elements of modern security strategies is network segmentation, which involves the division of a network into smaller, isolated segments to limit unauthorized access to sensitive resources. As network segmentation is ... Read More
Loading...