30 April, 2019 | Brian Svidergol

What is the Principle of Least Privilege?

In this blog post, we will explain the principle of least privilege (POLP), provide the definition and use cases, and explain the importance of the principle. Like many other security principles and concepts, this principle is one part of a larger security strategy that aims at mitigating the risk...
26 March, 2019 | Ryan Brooks

The CIA Triad and Its Real-World Application

What is the CIA triad? Information security revolves around the three key principles:  confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
3 August, 2017 | Michael Ustinov

Top 4 IT Security Trends to Keep an Eye On

With attacks getting increasingly frequent and sophisticated, the traditional approach to shielding your IT ecosystem is no longer working. You can’t simply tie hands of “bad guys” and give full privileges to “good guys” because you can’t know which users you can actually trust. For...
17 November, 2016 | Russell Smith

Windows Information Protection: Your Private Security Helper

Windows Information Protection (WIP) provides organizations with a set of features to support a Mobile Device Management (MDM) system and enable separation of corporate and personal data to prevent leaks. In this article, I'll explain how WIP works. Why Use WIP? As corporate data becomes...
28 September, 2016 | Alex Vovk

Yahoo Data Breach, Part 2: Safety Tips for Users

After Yahoo confirmed serious data breach many of its users chose to block or delete their accounts. Nevertheless, this action doesn’t re-establish data privacy and doesn’t ensure that this information won’t be sold and used by the third parties. In this blog post we discuss the impact...
16 June, 2016 | Michael Fimin

4 Takeaways from Cyber Innovation Showcase at Infosec16

Infosecurity Europe 2016, Europe’s number one information security event, took place in London, 7–9 June 2016. Cybercrimes, ransomware, and insider threat detection were this year’s hot topics. Netwrix experts ran a few speaking sessions at the Cyber Innovation Showcase segment that...
28 March, 2016 | Sarah Greesonbach

Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as well as important details for various kinds of compliance regulations, including GLBA, PCI, FISMA,...
22 February, 2016 | Vlad de Ramos

IT Security Standards: What Is Best for My Organization (Part 1)

While it was a common concern for computing people to implement security measures within their information assets, there has to be a “de facto”, meaning, the standards which focuses on the minimum solutions that addresses information security concerns on an industry or on a regulatory...
Show more articles
...