Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

What's the difference between a Distribution Group and a Mail Enabled Security

In #ActiveDirectory, companies use #DistributionGroups and #SecurityGroups to manage their users. With #DistributionLists, emails are sent in groups while #SecurityGroups manage access rights. The difference between the two group types allows extensive management of resources. Is creating #DistributionGroups equally important as security groups? Why do you need distribution lists if you can mail enable security groups? Watch this video to find out!

Cybersecurity Threats & Challenges in Healthcare Industry

78% of healthcare organizations experienced a cyberattack in the past year, exposing millions of patients' sensitive data. With patient records selling 10x more than other data on the dark web, threat actors are relentlessly targeting healthcare. To learn more on how you can Protect your institute - watch this video. Netwrix GroupID automates and delegates group and user management, necessary for Healthcare organizations, ensuring your directories remain current and empower you to enhance security while increasing IT productivity.

Active Directory Group Name Examples & Best Practices

Naming conventions for Active Directory and Azure AD groups can be confusing. This video explains how to create clear and consistent group names using prefixes, descriptions, and approval workflows. By following these best practices, you can make it easier for users to understand the purpose of each group and avoid confusion. Integrate #NetwrixGroupID with your #ActiveDirectory or #AzureAD to appropriately identify all your directory groups. You can define policies for adding prefixes to group names, standardize them and build a template as well.

Communicating Cyber Risk to Executives and Boards with Shamane Tan

In this episode of Cyber Security Decoded from Rubrik Zero Labs, host Steve Stone is joined by Chief Growth Officer at Sekuro and Best-Selling Author Shamane Tan to discuss differences in the cybersecurity landscape between the US and APAC, communication strategies for CISOs, building trust for better cybersecurity outcomes, improving organizational resilience, and diversity in the cybersecurity field.

Unlocking Competitive Edge: Leveraging Cybersecurity and Privacy Protection in Retail #podcast

Discover how cybersecurity and privacy protection have become pivotal elements in gaining a competitive edge, especially for organizations like retailers. In this video, we explore the significance of building trust with both customers and employees by demonstrating robust security measures in handling sensitive data. Learn how prioritizing cyber and privacy protection can set businesses apart and strengthen their reputation in the marketplace.