Sichere Identitäten, weniger Risiko – So stoppen Sie Ransomware effektiv

Die Cybersicherheitslandschaft verändert sich rasant, und Identitätssicherheit spielt eine entscheidende Rolle im Schutz vor modernen Bedrohungen. In hybriden Unternehmensumgebungen ist es essenziell, genau zu wissen, wer auf was zugreift, um unbefugten Zugriff zu verhindern und gleichzeitig sichere Berechtigungen zu gewährleisten. Doch in vielen Unternehmen fehlt ein umfassender Überblick über Identitäten und ihre Zugriffsrechte – eine […]

Microsoft & Silverfort Webinar: Meilleures pratiques et challenges du Tiering AD

Alors que la surface d’attaque des identités continue d’évoluer avec de nouvelles méthodes pour compromettre les organisations, le besoin de sécuriser Active Directory (AD) devient de plus en plus important. Bien que le Tiering AD soit une pratique fondamentale pour séparer et protéger les comptes à privilèges, de nombreuses organisations négligent son importance, ce qui […]

Uncovering and Addressing the Blind Spots in Privileged Access Management

Many organizations depend on Privileged Access Management (PAM) to secure administrator accounts — but relying on PAM alone can leave dangerous security gaps. Attackers increasingly exploit standing privileges, misconfigured accounts, and overlooked non-human identities. It’s time to evolve your privileged access strategy. In this webinar, Ron Rasin, Chief Strategy Officer at Silverfort, and Kev Smith, […]

HIPAA Compliance 2.0: Is Your Identity Security Strategy Ready?

The newly proposed HIPAA security updates are being reviewed now, and they will demand more than just “check-the-box” compliance. Identity security on the frontline of healthcare cybersecurity and HIPAA compliance. Attackers are actively exploiting weak identity security controls—don’t let your organization be next. The proposed changes to the HIPAA framework are a necessary step toward […]

Beyond the perimeter: Addressing blind spots in identity security for 2025 and beyond

As the security attack landscape continues to evolve, identity security has emerged as the next critical frontier. With an anticipated surge in identity-related threats as we move into 2025, organizations can no longer afford to overlook the security risks tied to user identities, access controls, and digital credentials. In this webinar, Silverfort CEO and Co-Founder, […]

CISO Perspective: Why Great Companies with Great Solutions Still Get Breached

In today’s constantly shifting threat landscape, even the most well-prepared companies with the latest and greatest solutions can still fall victim to breaches. But why does this happen? In this webinar, Silverfort’s CISO, John Paul Cunningham, shares his wisdom as to why even great organizations can be exposed and what can be done to strengthen […]

Preventing Privilege Escalation: Effective PAS Practices for Today’s Threat Landscape

As privileged accounts continue to be one of the highest-risk targets for cyberattacks, managing them effectively is more critical than ever. But as you know, this is much easier said than done. Traditional PAM solutions are subject to inherent blind spots that prevent them from providing end-to end security to all privileged users. Additionally, these […]

Beyond the Endpoint: A Deep Dive into Using Identity as the Basis for Incident Response

Three-quarters of organizations face faster-moving cyber threats than ever, making rapid detection and response essential. Traditionally, response focused on endpoints, but with attackers increasingly leveraging legitimate credentials, a compromised endpoint is no longer the main concern. Misuse of credentials now drives lateral movement and data exfiltration, positioning identity as a critical indicator of compromise and […]

Webinar-Top 5 Evaluation Criteria for ITDR Solutions

In today’s digital landscape, identity threats are more prevalent than ever. Protecting your digital identity is crucial as lateral movement and ransomware attacks rise. The new category of Identity Threat Detection and Response (ITDR) has emerged to address these challenges, but selecting the right tool can be daunting.. Hear from Yiftach Keshet, VP of Product […]