Is Audit Concerned About Your Privileged Ariba Users? We Have an Easy Fix

The landscape of cyber security has seen a dramatic shift in recent years, with privilege abuse emerging as a central concern. This concern is amplified for SAP Ariba, considering its prominence in ...

Comply with NIS2 Directive MFA Requirements with Silverfort

In article 21, the NIS2 Directive defines the minimum set of security measures regulated entities must implement to comply with its requirements. Section 2(j) relates directly to Multi-Factor Authentication (MFA), stating that ...

How Silverfort Solves the Toughest Challenges of Privileged Access Management

The standard way of addressing security issues that stem from an organization’s privileged user accounts is with a privileged access management (PAM) solution, which can be a very effective tool against threats ...

Compliance with CCOP Identity Protection Requirements Made Easy with Silverfort

The Cybersecurity Code of Practice for Critical Information Infrastructure 2.0 is an enhancement of the first version that was released in 2018 This Code is intended to specify the minimum cybersecurity requirements ...

How to Accelerate the Privileged Access Management Journey

A robust PAM solution in place deprives threat actors of the ability to utilize compromised admin credentials for malicious access and enables organizations to ensure that those who need privileged access get ...
Active admins

AWS is Under Threat from Unused Privileges

Amazon Web Services (AWS) provides the backbone infrastructure for many organizations, making it a vital resource that needs to be protected. Sprawling across a wide range of apps and services, AWS is ...

Identity Threat Detection and Response Explained

In March, Gartner analysts dropped us some breadcrumbs on an emerging new category that they are calling “Identity Threat Detection and Response” (ITDR). The post Identity Threat Detection and Response Explained appeared ...
automation multifactor authentication

Cloud Automation Key to Future-Proofing Cybersecurity

Organizations are turning to cloud automation to help them future-proof cybersecurity plans, particularly when coupled with autonomous privileges and access. These were among the results of a Delinea survey of 300 IT ...
Security Boulevard

New Insights into Privileged Access Management (PAM) Best Practices

The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, ...
privileged access workstation security survey infographic

Privileged Access Workstation Adoption: Infographic & Survey Data

| | privileged access
This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security. First – there seems to be a resounding agreement that Windows ...