logo
September 14, 2020 | Ryan Brooks

Cloud Challenges by the Numbers: Adoption and Configuration

The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in...
July 27, 2020 | Mike Tierney

Quantitative Risk Analysis: Annual Loss Expectancy

Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions. This article explains how to calculate your cybersecurity risk using the concept of annual loss...
August 13, 2020 | Ryan Brooks

2020 State of the Cloud Statistics

Cloud Usage The cloud had become mainstream during the last couple of years, but the year of 2020 has pushed companies to adapt to remote working, which immediately led to a rapid adoption of cloud services. Research indicates that overall use of cloud services across industries has already...
June 11, 2020 | Ryan Brooks

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
June 17, 2020 | Ryan Brooks

The Purpose of IT Risk Assessment. Why Bother?

IT risk assessment is the process of identifying security risks and assessing the threat they pose. The ultimate purpose of IT risk assessment is to mitigate risks to prevent security incidents and compliance failures. However, no organization has the resources to identify and eliminate all...
June 25, 2020 | Ryan Brooks

Risk Analysis Example: How to Evaluate Risks

Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk analysis focuses on the risks that both internal and external threats pose to the...
April 21, 2020 | Ryan Brooks

Beginner’s Guide to IT Risk Management

Managing risk is at the heart of every enterprise. Decisions about finance, marketing, expansion and human resources all include some level of risk. When enterprises evaluate their IT-related risks, factors that come into play include security, access, data handling and regulatory compliance...
April 22, 2020 | Ryan Brooks

Top IT Priorities for 2020

In October 2019, Netwrix asked IT pros to name the five IT projects that will be their top priorities in 2020. We got feedback from 846 respondents worldwide. This is what we learned from their responses. According to the Netwrix IT Trends 2020 report, data security takes the gold medal as the...
July 6, 2020 | Ilia Sotnikov

Five Mistakes that Could Lead to a Third-Party Data Breach

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...
Show more articles
...