Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netwrix Access Analyzer 26 - Major Advances in DSPM

Join us for Day 5 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Jeff Warren, Grady Summers, and Jordan Violet discuss how Netwrix Access Analyzer 26 is redefining data security posture management. They explore the new architecture built for scalability, flexibility, and speed — and how it helps organizations discover, understand, and secure sensitive data at scale.

Copilot Readiness - Tighten Data Controls to Scale Secure AI

Join us for Day 3 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Farrah Gamboa and Hanan Levy discuss how organizations can prepare for Microsoft 365 Copilot by strengthening governance around data and identities. They share insights on preventing oversharing, reducing excessive permissions, and closing compliance gaps before deploying AI tools.

Netwrix AI - Accelerating Your Path to Data & Identity Security

Join us for Day 2 of the Netwrix Innovation Week Podcast Series, part of Cybersecurity Awareness Month. In this episode, Grady Summers and Jeff Warren discuss how Netwrix is building AI into the 1Secure Platform to help security teams gain faster insights, automate remediation, and stay in control. They also explore how we’re using AI responsibly to keep customer data private, protected, and within your control.

Uncover Hidden AD Group Risks & Privileged Access with Netwrix Auditor

Do you know who has actual privileged access in your Active Directory? In this webinar, see how Netwrix Auditor for Active Directory uncovers the real story behind administrative group membership, including nested permissions, effective access, and misaligned rights with built-in reporting and alerting.

Is your VPN a silent entry point for attackers?

Is your VPN a silent entry point for attackers? Credential stuffing and password spraying exploit weak authentication, giving attackers a way into VPNs and edge network devices — making them prime targets in today’s identity-driven threat landscape. In this snippet, our expert breaks down: Watch the full webinar: Adapting to a New Paradigm in Security – Implementing ITDR in Your SOC: netwrix.com/go/adapting-to-a-new-paradigm-in-security-yt.

Can ChatGPT Decode Exploit Data? You'll Be Surprised!

Can ChatGPT really make sense of exploit data? The answer is yes. In this clip, security expert Brian Johnson shows how ChatGPT decoded a hex-encoded payload and revealed the contents of a password file in seconds. Watch the full webinar to see how AI tools like ChatGPT are changing the penetration testing game.

Protect your Organization with Netwrix Data Security Posture Management

Would your team know if a hacker was moving through your systems right now? 45% of data breaches involve cloud-based data, often due to poor visibility and weak security posture. Every day, attackers exploit blind spots in data discovery, classification, and monitoring—gaining access to critical information undetected. Netwrix Data Security Posture Management (DSPM) puts an end to that. Ready to take control of your data security posture?

Can ChatGPT Help with a Penetration Test? Real-World Hacking Test vs PentestGPT

Can ChatGPT really assist in a penetration test? In this short clip, security expert Brian Johnson puts it to the test against an Active Directory environment… and let’s just say, the results are less than helpful. Find out why tools like PentestGPT are gaining momentum in ethical hacking in this webinar, "Hack the Hackers: Exploring ChatGPT and PentestGPT in Penetration Testing": netwrix.com/go/exploring-chatgpt-and-pentestgpt-yt.

Why Security Teams Must Rethink Incident Response for Identity Attacks

Blocking a CEO's account to stop an anomaly? It might stop your business too. When implementing Identity Threat Detection and Response (ITDR), security teams must balance robust protection and business continuity. In this clip, our expert explains why blindly blocking access can cause more damage and how identity-proofing methods, like 2FA and push notifications, offer a smarter approach. Rethink your strategy to keep security seamless.