Applying Service Accounts Security Best Practices with Silverfort

Applying Service Accounts Security Best Practices with Silverfort

Managing service accounts can be a daunting task for organizations, as service accounts are scattered across different environments and are used by various business applications, and are typically forgotten about unsupervised. Meaning in most organizations nobody is tracking their use or validating that they are not compromised or used by ... Read More

3 Cyberattacks in Which Compromised Service Accounts Played a Key Role

Securing service accounts is a notoriously difficult task. One of the main reasons for this difficulty is that service accounts are often forgotten about and left unsupervised. Resulting in no one tracking their use or validating that they aren’t compromised and used by malicious actors. Additionally, having limited to zero ... Read More

The Security Risks of Service Accounts: You Can’t Protect What You Can’t See

Service accounts play an important role in today’s enterprise environment. These non-human or machine-to-machine (M2M) accounts are used by applications, systems, and services to perform important automated tasks in a network. They need access to resources such as databases, file shares, and other resources to perform their routine tasks. Because ... Read More
Top 5 Identity Protection Challenges for Manufacturing Companies

Top 5 Identity Protection Challenges for Manufacturing Companies

| | Blog
It is common knowledge that Manufacturing is one of the most targeted verticals and that threat actors launch data theft and ransomware operations on manufacturing companies daily. What is less commonly known is that the rise of identity threats’ part within the overall threat landscape collides with security weaknesses that ... Read More

How to Accelerate the Privileged Access Management Journey

A robust PAM solution in place deprives threat actors of the ability to utilize compromised admin credentials for malicious access and enables organizations to ensure that those who need privileged access get it in a secure manner. However, due to its lengthy and complex deployment time, PAM programs can often ... Read More

The MFA Blind Spot of Legacy Applications

| | Blog
Despite the surge over the past few years to move all resources to the cloud, the use of legacy, on-prem applications isn’t disappearing. In a typical enterprise, these applications support the day-to-day operational processes in almost all verticals from finance and manufacturing to healthcare and hospitality. While legacy applications are ... Read More

Customer Case Study: Preventing NTLM-Based Lateral Movement with Silverfort 

| | Blog
Since its inception, NTLM authentication protocol has been infamous for its low resiliency against attackers that seek to compromise it for malicious access. While NTLM ceased to be the default in Active Directory environments long ago and many organizations now strive to restrict usage or even ban it altogether, it’s ... Read More

When Alerts Overwhelm: Combatting MFA Fatigue

| | Blog
As important as multi-factor authentication (MFA) is for an enterprise, too much of a good thing can be problematic. This is why so many organizations today are struggling with a phenomenon known as “MFA fatigue,” where employees become so overwhelmed with MFA prompts that they start ignoring them, bypassing them, ... Read More