logo
October 23, 2020 | Ryan Brooks

Security Analytics

As cybersecurity threats evolve, companies must adapt and rethink their security strategies. This means moving away from traditional technologies and towards new cybersecurity frameworks. One such framework is the NIST cybersecurity framework, which comprises five major functions: Identify ...
September 10, 2020 | Ryan Brooks

Cloud Challenges by the Numbers: Adoption and Configuration

The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in...
July 24, 2020 | Mike Tierney

Quantitative Risk Analysis: Annual Loss Expectancy

Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions. There are two types of risk analysis — quantitative and qualitative: Quantitative risk analysis is an...
June 25, 2020 | Ryan Brooks

2020 State of the Cloud Statistics

Cloud Usage The cloud had become mainstream during the last couple of years, but the year of 2020 has pushed companies to adapt to remote working, which immediately led to a rapid adoption of cloud services. Research indicates that overall use of cloud services across industries has already...
June 10, 2020 | Ryan Brooks

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
April 7, 2020 | Ryan Brooks

Risk Analysis Example: How to Evaluate Risks

Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk analysis focuses on the risks that both internal and external threats pose to the...
March 20, 2020 | Ryan Brooks

Beginner’s Guide to IT Risk Management

Managing risk is at the heart of every enterprise. Decisions about finance, marketing, expansion and human resources all include some level of risk. When enterprises evaluate their IT-related risks, factors that come into play include security, access, data handling and regulatory compliance...
March 12, 2019 | Ilia Sotnikov

Five Mistakes that Could Lead to a Third-Party Data Breach

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...
February 28, 2019 | Ryan Brooks

IT Risks in the Education Sector: Real Threats vs. Expectations

In this blog post, which is based on the results of Netwrix’s 2018 IT Risks Report, we will dive deeper into the problems that face schools, colleges, universities and other educational organizations. The survey covers the six most common types of IT risks: physical damage, intellectual property...
Show more articles
...