logo
March 25, 2020 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
March 10, 2020 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Handpicked related content: A Vision for Strong...
September 2, 2020 | Michael Fimin

Top 5 cybercrime patterns to watch out for in 2016

Netwrix predictions: What types of cybercrime will potentially affect U.S. companies in the coming year. According to the Chronology of Data Breaches by Privacy Rights Clearinghouse, a nonprofit organization that aims to raise awareness about how technology affects personal privacy, the number of...
October 1, 2019 | Ken Hess

10 Security Tips for the US Government

The recent Office of Personnel Management (OPM) hack reveals that the US Government needs to significantly “up” its security game. Upping the game means that government security staff needs to impose greater restrictions on information access. But, one should ask, “Why were these secret...
February 25, 2019 | Richard Muniz

10 Things to Consider for a Cyber Incident Plan

We go out, we buy antivirus protection, we buy firewalls, we jump through hoops to keep bad things from happening. And when they do, we find ourselves trying to sort out what to do next. That’s the wrong time to be trying to figure that out. You need to have a plan, and in this case, a cyber...
...