Netwrix Auditor – Data Discovery & Classification Edition is out! Learn More
1 February, 2018 | Ryan Brooks

Top 20 Critical Security Controls for Effective Cyber Defense

With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations,...
29 November, 2016 | Ben Brumm

9 Best Practices for Granting Oracle Privileges

Oracle has several features to allow you to improve the security of your database. One such feature is the ability to grant privileges to users. In this article, I’ll discuss what privileges are and list some best practices for their use. It will help you to gain more visibility into what's...
4 October, 2016 | Jeff Melnick

SysAdmin Magazine: Tools and Tips for Security Admins

In today’s world full of cyber threats, security administrators are a company’s first step in defense against countless security risks. Every day they monitor networks, support security tools, establish security requirements, perform vulnerability assessments, and much more. The October edition...
30 September, 2016 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
Show more articles