logo
October 23, 2020 | Ryan Brooks

Security Analytics

As cybersecurity threats evolve, companies must adapt and rethink their security strategies. This means moving away from traditional technologies and towards new cybersecurity frameworks. One such framework is the NIST cybersecurity framework, which comprises five major functions: Identify ...
September 10, 2020 | Ryan Brooks

Cloud Challenges by the Numbers: Adoption and Configuration

The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in...
July 24, 2020 | Mike Tierney

Quantitative Risk Analysis: Annual Loss Expectancy

Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions. There are two types of risk analysis — quantitative and qualitative: Quantitative risk analysis is an...
June 25, 2020 | Ryan Brooks

2020 State of the Cloud Statistics

Cloud Usage The cloud had become mainstream during the last couple of years, but the year of 2020 has pushed companies to adapt to remote working, which immediately led to a rapid adoption of cloud services. Research indicates that overall use of cloud services across industries has already...
June 10, 2020 | Ryan Brooks

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
April 7, 2020 | Ryan Brooks

Risk Analysis Example: How to Evaluate Risks

Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk analysis focuses on the risks that both internal and external threats pose to the...
March 20, 2020 | Ryan Brooks

Beginner’s Guide to IT Risk Management

Managing risk is at the heart of every enterprise. Decisions about finance, marketing, expansion and human resources all include some level of risk. When enterprises evaluate their IT-related risks, factors that come into play include security, access, data handling and regulatory compliance...
November 21, 2019 | Ryan Brooks

Top IT Priorities for 2020

In October 2019, Netwrix asked IT pros to name the five IT projects that will be their top priorities in 2020. We got feedback from 846 respondents worldwide. This is what we learned from their responses. According to the Netwrix IT Trends 2020 report, data security takes the gold medal as the...
March 12, 2019 | Ilia Sotnikov

Five Mistakes that Could Lead to a Third-Party Data Breach

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...
Show more articles
...