Transposition française de la directive NIS2 – en matière d’identité, quelles sont les mesures attendues?
L’ANSSI travaille depuis plusieurs mois sur la transposition de la directive européenne NIS2 en droit français. Récemment, une première ébauche a circulé sur Internet, initialement mise en ligne par LeMagIT, que plusieurs journaux ont décortiqué. En attendant la publication d’une version définitive, ce document fournit déjà une perspective importante sur ... Read More

AD Tiering Made Simple(r)
Active Directory (AD) tiering is nothing new for organizations that need the most secure IT environments, like those in the defense and critical infrastructure spaces. While it is a surprisingly underused approach to partitioning and protecting an organization’s most valuable assets and accounts, it is starting to find its way ... Read More

Beyond Passwords: Why Trusting Password Hygiene Isn’t Enough
Let’s discuss passwords and identity security. By entering a password that only you know, you are in theory “proving” to a system that you are who you claim to be. They have been widely used in the IT/OT world for a very long time – arguably too long. To ... Read More

Navigating Retail: Overcoming the Top 3 Identity Security Challenges
As retailers compete in an increasingly competitive marketplace, they invest a great deal of resources in becoming household names. But brand recognition is a double-edged sword when it comes to cybersecurity. The bigger your name, the bigger the cyber target on your back. Data breaches in the retail sector cost ... Read More

Unlocking HIPAA Compliance: Navigating Access Control and MFA Guidelines
As technology continues to revolutionize healthcare operations, protecting patient data has never been more challenging. In the ongoing struggle against data breaches, last year marked a tipping point, as an unprecedented 133 million healthcare records were breached, according to the HIPAA Journal. In this blog, we will delve into the ... Read More

Identity Security in M&A: Gain Visibility into Consolidated Environments with Silverfort
When a company intends to acquire another organization through a merger or purchase, it is important to know what security risks could accompany the acquisition. Without this, organizations could open themselves to significant financial and legal challenges. Following an M&A, IT teams must merge different technologies and resources as the ... Read More

Silverfort Announces New Integration with Microsoft Entra ID EAM
Silverfort is excited to announce our integration with external authentication methods (EAM) in Microsoft Entra ID, which is now in public preview. This allows customers to use Silverfort seamlessly with any app or service that relies on Entra ID as an identity provider. Enhanced MFA and Threat Intelligence In today’s ... Read More

5 Ways to Step Up Your AD Hygiene with Silverfort
Active Directory (AD) is the backbone of most organizations’ networks, managing access and authentication for users, devices and applications. While AD provides both users and administrators with central services, its security has not kept pace with growing modern security risks. As a tempting target for threat actors, this is a ... Read More

Mitigating the Identity Risks of Ex-Employees’ Accounts
One of the biggest security weaknesses organizations face is their own employees. This isn’t pleasant, but it is a reality we must accept. When they make mistakes, they open the door to attackers. This is even more true when dealing with the user accounts of previous employees. It’s a common ... Read More

Identity Segmentation: A Key Pillar in Bolstering Security Posture
As cyber threats evolve, organizations must constantly adapt their identity security strategies to stay protected. One of the most significant elements of modern security strategies is network segmentation, which involves the division of a network into smaller, isolated segments to limit unauthorized access to sensitive resources. As network segmentation is ... Read More