privileged access
Is Audit Concerned About Your Privileged Ariba Users? We Have an Easy Fix
The landscape of cyber security has seen a dramatic shift in recent years, with privilege abuse emerging as a central concern. This concern is amplified for SAP Ariba, considering its prominence in ...
Comply with NIS2 Directive MFA Requirements with Silverfort
In article 21, the NIS2 Directive defines the minimum set of security measures regulated entities must implement to comply with its requirements. Section 2(j) relates directly to Multi-Factor Authentication (MFA), stating that ...
How Silverfort Solves the Toughest Challenges of Privileged Access Management
The standard way of addressing security issues that stem from an organization’s privileged user accounts is with a privileged access management (PAM) solution, which can be a very effective tool against threats ...
Compliance with CCOP Identity Protection Requirements Made Easy with Silverfort
The Cybersecurity Code of Practice for Critical Information Infrastructure 2.0 is an enhancement of the first version that was released in 2018 This Code is intended to specify the minimum cybersecurity requirements ...
How to Accelerate the Privileged Access Management Journey
A robust PAM solution in place deprives threat actors of the ability to utilize compromised admin credentials for malicious access and enables organizations to ensure that those who need privileged access get ...

AWS is Under Threat from Unused Privileges
Amazon Web Services (AWS) provides the backbone infrastructure for many organizations, making it a vital resource that needs to be protected. Sprawling across a wide range of apps and services, AWS is ...
Identity Threat Detection and Response Explained
In March, Gartner analysts dropped us some breadcrumbs on an emerging new category that they are calling “Identity Threat Detection and Response” (ITDR). The post Identity Threat Detection and Response Explained appeared ...

Cloud Automation Key to Future-Proofing Cybersecurity
Organizations are turning to cloud automation to help them future-proof cybersecurity plans, particularly when coupled with autonomous privileges and access. These were among the results of a Delinea survey of 300 IT ...
New Insights into Privileged Access Management (PAM) Best Practices
The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, ...

Privileged Access Workstation Adoption: Infographic & Survey Data
This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security. First – there seems to be a resounding agreement that Windows ...