Netwrix Auditor – Data Discovery & Classification Edition is out! Learn More
Jeff Melnick
Manager of Sales Engineering
15 May, 2018

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or...
8 May, 2018

RSA Conference 2018: Top 5 Pieces of Advice for CISOs

As expected, the 27th RSA Conference in April 2018 was one of the major IT security events of the year. 650 exhibitors and 45,000 security professionals came together in San Francisco's Moscone...
Best Practices
3 May, 2018

Differences Between Share and NTFS Permissions

NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are...
Best Practices
18 April, 2018

How to Manage File System ACLs with PowerShell Scripts

Many organizations with a Microsoft Windows environment rely on NTFS as the main file system for their storage devices that contain sensitive data. It is the easiest way for users to work with files....
2 April, 2018

[Infographics] Top Cloud Security Risks for Healthcare

The healthcare industry has always struggled with data security. Because healthcare organizations store enormous amounts of sensitive data and are subject to stringent compliance regulations, they...
Show more articles