Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

SMBv3 Vulnerabilities Explained

Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server Message Block (SMB) protocol at the center of this.

How to Conduct an Identity and Access Management Risk Assessment

Identity and access management (IAM) plays a crucial role in security by helping to ensure that each user in the organization has access to only the data, systems, and other resources they need to do their job. This article explains the critical functionality of IAM solutions and how an IAM assessment can help you uncover essential risks to security, compliance, and business continuity. Then, it offers IAM best practices and guidance on choosing the right IAM solutions for your organization.

What Is Sensitive Data?

With the advent of the digital transformation — spurred on by the pandemic-related rise in remote work — companies now store most of their data digitally. While moving to digital data storage is incredibly convenient and promotes increased collaboration and efficiency, it has also opened the door for an unprecedented number of cyber-attacks and data breaches.

Understanding Effective Access in SQL Server

Microsoft SQL Server is a popular relational database management system (RDBMS). However, determining the effective access rights of users is difficult because in Active Directory (AD) environments, effective access is determined based on not only the user’s direct permissions but also their membership in SQL Server roles, AD groups and Local Windows groups.

Getting Started with Microsoft 365 Security and Compliance

In 2022, Microsoft rebranded its compliance and risk management tools under the name Microsoft Purview. Microsoft Purview provides a wealth of valuable functionality, including capabilities formerly provided by tools like Office 365 Security and Compliance, Microsoft 365 Security Center and Microsoft Compliance Manager.

Securing the Cloud: A Comprehensive Guide to Identity and Access Management

In the not-so-distant past, managing user identities and access controls was a relatively straightforward process. Organizations operated within the confines of their on-premises networks where users logged onto a single system to access the resources they needed. This well-defined perimeter enabled IT departments to maintain tight control over who accessed what and from where. However, the advent of cloud computing has disrupted this traditional paradigm.

Netwrix PolicyPak

In today's hybrid work environment, users need to access their desktops, laptops and other devices at the office, at home, while traveling, through kiosks and virtually. But many organizations are struggling to manage and secure their IT ecosystem because not all Windows endpoint management software systems were designed for modern distributed scenarios. Netwrix PolicyPak enables you to solve your endpoint management and endpoint protection challenges wherever users get work done, modernizing and extending the power of your existing enterprise technology assets.

How to Install Microsoft SQL Server

SQL Server is a widely used relational database management system (RDBMS) developed by Microsoft. It provides secure, scalable and high-performance storage and management of structured and unstructured data. SQL Server offers a wide range of features and tools for database administration, development, business intelligence and advanced analytics.

Integrate Identity and Access Management with HIPAA, NIST, GDPR and CCPA in Healthcare

The healthcare sector is a top target of cyber criminals eager to steal sensitive data and extort high ransoms. The key to thwarting costly attacks is to understand that identity is the new security perimeter. By implementing robust identity and access management (IAM), healthcare organizations can significantly enhance their security and cyber resilience. This article explains the role of IAM in healthcare and details the most pressing IAM gaps to address.

The Top 5 Areas of Your IT Ecosystem to Monitor in 2024

In today’s complex IT ecosystems, extending equal protection across the entire network is simply not feasible. Instead, organizations need to determine which systems are inherently most critical and prioritize maintaining their operational integrity through effective IT monitoring: tracking performance and activity across servers, applications and other technology components.