Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Configure Group Policy Settings to Deploy Real GP using SCCM or Other Management Systems

Do you have endpoints that you'd love to manage using real Group Policy, but want to deploy the settings using something else? This video explains how to deliver Group Policy settings with Netwrix PolicyPak, including how to deploy templates, preferences and security settings to your endpoints using SCCM, KACE, Altiris or another desktop management system.

Evolving Threats in the Cloud and What They Mean

As organizations move data and infrastructure into the cloud, they open themselves up to new and novel cyber threats, often without realizing it. In this Fal.Con 2022 session, Duke McDonald, Strategic Threat Advisor, CrowdStrike, explains how to not only highlight threats in the cloud based on real adversary tactics and attacks, but also how to meaningfully address these risks.

Innovate with AWS and Secure with CrowdStrike

In the last two years, the shift to cloud adoption has only accelerated. This rapid shift has reinforced the profound importance of protecting IT assets from the latest cyber threats. AWS and CrowdStrike are working together to provide joint solutions for wherever you are in your cloud journey. From migrating VMware-based workloads in a lift or shift fashion or completely modernizing your infrastructure with microservices and containers, AWS and CrowdStrike have a solution to help you innovate and secure your infrastructure.

Women In Cyber Security | Razorwire Podcast

We're back with another episode of the Razorwire Podcast! In our new episode, we're going to talk about women in cyber security. As part of this, I've invited three fantastic women on this podcast who are leaders in their fields. Firstly, we have Megan Brown, our guest host for this episode. Megan is currently Head of International Sales at LogicGate. Megan’s guests today may be familiar to you from previous episodes: Stefania Chaplin, a solutions architect at GitHub, and Claire Davies, CISO at Arriva Group.

Cloud-Native Application Platform (CNAPP): Bridging the GAP for DevSecOps

As businesses move their applications, workloads and critical data to the cloud, it becomes more important to rethink how to protect those resources and how to manage those protections. Unfortunately, organizations race to adopt cloud workload protection tooling without considering the bigger picture of how all cloud security controls must work together across all layers of their technology stack, especially the application layer. As a result, they often end up with different security solutions and controls working in silos, which leads to a lack of visibility, a lack of security consistency and security gaps.

[Webinar] DevOps backups vs. ransomware - best security and compliance practices.

Ransomware is still on the rise and does not bypass DevOps ecosystems and SaaS services. Backup is the final line of defense against ransomware so it should be ransomware-proof itself. Join the webinar and check on how to ensure security and continuity of operations in your DevOps environments.

How to Use Group Policy and Netwrix PolicyPak to Remove Local Admin Rights

This video explains step-by-step how you can use Group Policy and Netwrix PolicyPak to get out of the local admin rights business. Start out by finding where you have local admin rights, and then remove the source using in-box GP preferences. Then use Netwrix PolicyPak to elevate your now-standard users so they can keep doing the (admin-like) things they always have.