identity security
Navigating the Uncharted: A Framework for Attack Path Discovery
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, ...
Overcoming the 5 Biggest Challenges to Implementing Just-in-Time, Just Enough Privilege
Embracing a just-in-time and just-enough privilege approach that harnesses context and automation can remove the tension between security and productivity, enabling teams to run faster without compromising on security standards ...
The Unbreakable Bond: Why Identity and Data Security are Inseparable
Identity security and data security must be addressed simultaneously for an organization’s security posture to address security risks and threats adequately ...
Rezonate Streamlines Identity Security Across IT Environments
Rezonate has extended the reach of its platform for managing access to infrastructure to include the credentials that are used by humans alongside the identifies of machines and software components that organizations ...
The Growing Threat of Identity-Based Attacks and the Need for an Advanced Identity Security Approach
Identity-based attacks are escalating, targeting personal data and business secrets with unprecedented sophistication. Traditional security measures fall short; a new approach is essential. Explore advanced identity security strategies like Zero Trust, MFA, ...
How to Correctly Use Client IP Addresses in Okta Audit Logs to Improve Identity Security
Being able to identify client IP addresses is essential for detecting and preventing identity-related threats. These IP addresses help establish a baseline of identity activities and highlight deviations often associated with threat ...
Unearthing Identity Threat Exposures
Organizations must navigate through a tumultuous sea of cybersecurity threats today. As businesses increasingly transition to the cloud and embrace remote work, the complexity of managing digital identities has exponentially grown, unveiling ...
Why AI Needs Good Governance
As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology ...
How Silverfort Can Help Organizations Align with NIST’s Cybersecurity Framework Version 2.0
As cyber threats continue to evolve and become more sophisticated, protecting identities and access has never been more critical. To help organizations manage digital risks, the National Institute of Standards and Technology ...
Beating Identity Fraud: Four Ways to Validate an Identity Document
The global rise in identity fraud has been a major worry in the last few years, especially with so many important transactions increasingly taking place online, such as opening a bank account, ...