How Organizations Can Align with NIST’s Cybersecurity Framework Version 2.0

Applying security controls across an organization’s environment must be a top priority for every organization, regardless of its size, sector, or maturity. To help guide organizations in managing and reducing their cybersecurity risks, the National Institute of Standards and Technology (NIST) created a security framework that provides guidelines for organizations to manage and mitigate cybersecurity […]

Healthcare Identity Threats: Why Almost 20% of Breaches Lead to Injury

The healthcare industry faces significant threats from data breaches and compromised medical devices, resulting not only in high financial losses but also endangering patients’ health. In a survey of US healthcare experts conducted in 2022, 53% reported an increase in mortality rates due to ransomware attacks. In 2021, 30% of cyberattacks targeting healthcare organizations caused […]

Attention CISOs: Closing Your Identity Protection Gaps is Urgent

Here’s something that won’t be news to you: The identity-based attack surface is exposed to attacks. But what about your own organization? Do you know where your specific protection gaps are? A new report released by Osterman Research, entitled “The State of the Identity Attack Surface,” reveals the full extent of where today’s cybersecurity measures […]

Much More Than a Checkbox: Cyber Insurance Can Stop Ransomware Attacks

Qualifying for a cyber insurance policy is just one more checkbox that security teams are required to tick. We’ve heard this statement over and over. For most organizations, this is the main reason to purchase cyber insurance. While this mindset is not entirely without grounds. It turns out that by implementing the identity protection controls […]

Why Ransomware Has Become a Major Identity Threat

Ransomware continues to plague organizations around the world, with more than 493.3 million attacks detected in 2022. Despite a proliferation of products in the security stack, companies keep falling victim to these attacks, paying an average of $812,360 in ransom demands. And the total cost to an organization is estimated be $4.5 million, due to […]

The Security Risks of Service Accounts: You Can’t Protect What You Can’t See

Service accounts play an important role in today’s enterprise environment. These non-human or machine-to-machine (M2M) accounts are used by applications, systems, and services to perform important automated tasks in a network. They need access to resources such as databases, file shares, and other resources to perform their routine tasks. Because of their central role, these […]

Five Reasons Why Silverfort is the Perfect First Step on Your Zero Trust Journey

Zero Trust has traditionally been thought of in the context of a network, with implementation considered a project primarily focused on upgrading and segmenting legacy infrastructure. As long as the access to all physical assets was controlled, the thinking went, that could act as a proxy for extending trust in the form of access to […]