Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Netwrix: Attackers' Tricks to Exploit SQL Server and How to Avoid Them (Session 2)

Because SQL servers are so often attacked, it is critical to strengthen your defences and minimise your risk. Most SQL Server breaches are caused by misconfigurations, incorrect permissions or insufficient controls. In this webinar, we will explain how you can significantly improve the security of your SQL servers and thwart would-be attackers. In this session, you will learn how to.

Netwrix Data Classification

Every day, your organisation collects and produces tons of data. How can you possibly keep it all secure and organised? Netwrix Data Classification enables you to discover and tag your business-critical data and reduce its exposure. Plus, it also helps you achieve and prove your compliance with GDPR, PCI DSS, HIPAA, CCPA and other regulations.

Netwrix Data Classification

Every day, your organisation collects and produces tons of data. How can you possibly keep it all secure and organised? Netwrix Data Classification enables you to discover and tag your business-critical data and reduce its exposure. Plus, it also helps you achieve and prove your compliance with GDPR, PCI DSS, HIPAA, CCPA and other regulations.

Netwrix: Getting Maximum Value from Infrastructure Security Services

The Microsoft cloud offers a wealth of benefits, from powerful enterprise applications and built-in high availability to predictable costs. But most organisations still need their on-premises IT environment as well. Fortunately, there are proven strategies for making your trusted Active Directory and your shiny new Azure AD tenant work together, enabling a seamless user experience and strong security.

Netwrix: Hardening Your Hybrid Environment

We already know the principle of hardening for on-premises systems, apps and services. Now, let's apply it to the Microsoft cloud as well! Sander Berkouwer shows you the default settings in Azure AD and explains why they aren't appropriate for all organisations. By looking under the covers of Azure AD, you'll know when to dial the buttons that govern guest access, app consent and access to the Azure AD admin portal. Sander sprinkles some Conditional Access, Microsoft Defender for Identity and Azure Log Analytics goodness on top of these settings to keep you on top of all things Azure AD.

Netwrix: How to Protect Your Organisation Against Lateral Movement Attacks

Privileged Access Management (PAM) solutions seek to address a simple question - how do we appropriately provide and protect privileged access to our IT assets? Traditional PAM products have focused on deploying controls on top of an enterprise's existing identity practices, like providing password and session management for shared built-in admin accounts, or a password-of-the-day for personal privileged accounts.

Netwrix: Anatomy of an Attack: Ransomware Theory and Practice

Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don't even need much in the way of technical skills to carry out attacks, since multiple ransomware-as-a-service programs are available on the dark web. Moreover, the damage from a ransomware attack can be not just expensive but even catastrophic; some businesses never recover. Therefore, every IT team needs to build a strong protection strategy before it's too late.