logo
February 25, 2019 | Russell Smith

Secure PowerShell Remoting Using Constrained Endpoints

PowerShell Remoting is enabled in Windows Server 2012 (and later) out-of-the-box, and while many IT shops see this as a potential security risk, PowerShell is in fact one of the most secure ways to administer servers if best practices are followed. In this article, I’m going to show you how to...
April 5, 2019 | John O'Neill Sr.

Endpoint Protection vs Modern Threats

As IT professionals, it’s our responsibility to do everything within our power to protect our organizations from IT security threats. Unfortunately, all too often I hear fellow IT pros express an almost universal confidence in endpoint protection as the be-all, end-all to combating these threats....
July 6, 2020 | Nick Cavalancia

What's Getting Lost in Your Log Data?

When stories come up in the news about data breaches, if you're like me, you tend to gloss over them if they seem similar to something you've already read.  I almost did that today.  But something in this story really got my attention. There's a story this week about Neiman Marcus being hit...
September 1, 2020 | Stephen Schimmel

NetWrix’s Jeff Melnick Talks Endpoint Security With Help Net Security Editor In Chief

NetWrix's own Jeff Melnick recently sat down for a discussion with Help Net Security Editor In Chief Mirko Zorz to discuss the complex world of endpoint security. Melnick and Zork spoke in detail about the challenges associated with end point client protection, the influx of potentially hazardous...
October 17, 2019 | Stephen Schimmel

Free Tool of the Day: NetWrix USB Blocker

Today’s Free Tool of the Day, NetWrix USB Blocker, enforces centralized access control to prevent unauthorized use of removable media that connects to computer USB ports, while also preventing the spread of dangerous malware. Modern enhancements made to memory sticks, removable hard disks, iPods,...
...