Please turn on your JavaScript for this page to function normally.
cloud
Prioritizing security efforts is key to data security in the cloud

32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …

Norsk Hydro
Norsk Hydro cyber attack: What happened?

“Hydro subject to cyber-attack,” warned Oslo-headquartered Norsk Hydro ASA, one of the world’s biggest aluminum producers, on Tuesday. “Hydro has isolated …

Netwrix completes acquisition of Concept Searching

Concept Searching has been acquired by Netwrix Corporation. Concept Searching will remain active in the metadata management, classification, and insight engine market, …

risk
In terms of main threat actors, expectation rarely matches reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based …

PowerShell
eBook: Windows PowerShell Scripting Tutorial

This promotion has ended. This PowerShell tutorial opens with an introduction to PowerShell scripting basics. It guides you through various topics, starting with launching …

Action1, new cybersecurity startup founded by Netwrix veterans

The two co-founders of Netwrix, Alex Vovk and Mike Fimin, established Action1 with the vision of extending into the growing cloud-based cybersecurity market. After building …

CC Mag July 2018
Cyber Chief Magazine: GDPR Winning Moves

This promotion has ended. This issue delivers a ready-to-use GDPR kit packed full of how-to’s and practical tips that companies need to implement so they don’t end up on the …

cloud
The driving force of cloud security investments

A new Netwrix report supplements the 2018 Netwrix Cloud Security Report, unveiling survey findings specific to various industries and regions. Overall, 853 organizations …

idea
Download: CISSP Exam Study Guide

This promotion has ended. The CISSP Exam Study Guide provides a solid foundation for anyone preparing to become a Certified Information Systems Security Professional. It …

programmer
eBook: Detect and deter data theft by departing employees

This promotion has ended. Too many organizations choose not to take the threat of data theft by departing employees seriously — until they discover that their data has been …

Defending against crypto ransomware
eBook: Defending against crypto-ransomware

This promotion has ended. According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is …

road sign
Is this the year SIEM goes over the cliff?

While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly …

Don't miss

Cybersecurity news