Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
14 December, 2017 | Ryan Brooks

New Game: How Malicious Insider Stole Xmas & Data

Oh no! Someone has stolen a sack of sensitive data right on Xmas Eve! It looks like there is a stinky insider in your company. Catch him before he crashes the Xmas spirit! Don’t waste a second: start playing the new Netwrix game right now and save Xmas and critical company data. 5...
18 October, 2016 | Ryan Brooks

User Behavior Analytics: Best Practices You Should Start Now

How much do you know about User Behavior Analytics (UBA), emerging solution that helps detect growing malicious and abusive insider activity across IT environment that otherwise can go unnoticed? This article details the key challenges for protecting the most critical assets within your IT...
1 August, 2016 | Jeff Melnick

Defending Against Crypto-Ransomware Guide

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. 1. What is  Crypto-Ransomware Unlike traditional malware,...
3 June, 2016 | Troy Thompson

6 Tools to Protect Your Domain Controllers

There are many things that you can do as an administrator to reduce or eliminate risks associated with your Domain Controllers.  In this article, we’ll take a look at some tools you can employ to help with this. Attack Surface – This concept refers to software, protocols and ports are used...
20 April, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
Show more articles