Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Netwrix: Top 10 Security Features to Enable in Microsoft 365

Cybersecurity Awareness Month was established in 2004 to help everyone be safer and more secure online. Nearly two decades later, this mission remains vitally important, but as organisations around the world have embraced cloud technologies like Microsoft 365, the strategies required for effective cybersecurity have evolved a great deal. Are you up to speed?

Netwrix: Upgrade Your Ransomware Defences to the NIST Level

Virtually every organisation today is at risk of being targeted by a ransomware attack, and those attacks are more devastating than ever. Unfortunately, the native auditing and security controls available for protecting data are too simple to be effective against modern attack vectors. In this webinar, you'll learn how you can proactively mitigate your risk and detect ransomware threats promptly using a NIST-aligned strategy.

Netwrix: Ransomware Prevention Checklist

Ransomware is on everyone's mind these days, and you're undoubtedly seeing a lot of theories and speculation about how to defend against this increasingly pressing threat. We value your time, so we're inviting you to a very practical workshop with trusted MVPs. Join 17-time MVP Jeremy Moskowitz and MVP and RunAs Radio host Richard Campbell for a practical checklist for ransomware prevention. Join Jeremy and Richard for a 30-min interactive tech talk and learn exactly.

Netwrix: Remove Local Admin Rights and Block Malware

Ransomware is on everyone's mind these days, and you're undoubtedly seeing a lot of theories and speculation about how to defend against this increasingly pressing threat. We value your time, so we're inviting you to a very practical workshop with trusted MVPs. Join 17-time MVP Jeremy Moskowitz and MVP and RunAs Radio host Richard Campbell for a practical checklist for ransomware prevention. Join Jeremy and Richard for a 30-min interactive tech talk and learn exactly.

Netwrix: Active Directory Masterclass: AD Configuration Strategies for Stronger Security

Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure-but its inherent complexity leaves it prone to misconfigurations that can allow attackers to slip into your network and wreak havoc. To reduce risk, you need to ensure your AD is clean, configured properly, monitored closely and controlled tightly. Stealthbits is eager to help you achieve these goals.

Netwrix: PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we'll explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between.

Netwrix: PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we'll explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between. JOIN OUR SESSION TO DISCOVER.

Nightfall: Securing best of breed SaaS applications in 2021

The explosive growth of SaaS collaboration tools and other cloud-based platforms makes it paramount that organizations understand how to secure data in the cloud. Join us on Thursday, December 10 at 10 AM PT/1 PM ET for a 45 minute webinar and Q&A covering important cloud adoption trends in 2020 and best practices for securing your SaaS environments going into 2021.

Nightfall: Learn How to Protect Codebases from Secrets Exfiltration

Join us on Thursday, June 24th at 11 AM PT for a 45-minute session with Nightfall's CTO, Rohan Sathe, and product specialist, Michael Osakwe, to learn about the increased exfiltration risks posed by code repositories. Learn how threat actors are incorporating targets like GitHub into their attacks, why this has become more common, and best practices to reduce your attack surface.