Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... 3 weeks ago | 49 mins Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 2 months ago | 21 mins Data stewardship: best practices for getting started Bobbi Caggianelli, MSba, Data Engineer Leader, and Director of Sales Engineering for Collibra Are you early in your data governance journey and wondering where to start with data stewardship? Or have you been doing it a while and are losing mom... 1 week ago | 53 mins [Cyber Quest] Choose Your Own Security Adventure Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) In the face of modern Windows desktop challenges, both Group Policy and MDM fall short. But one tool rises to the occasion, adding a new dimension of ... 4 days ago | 64 mins A Look at Password Spraying Attacks and the Role of Weak Passwords Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) Misused credentials are at the center of cyberattacks, used for gaining access, moving laterally, exfiltrating data, and more. Passwords can be obtain... May 31, 2023 5:00pm Data Access Governance in the Digital Age Adam Rosen, VP of Product Strategy at Netwrix In today's digital world, data access governance has become a crucial aspect of protecting sensitive information. Organizations are facing increasing ... June 28, 2023 5:00pm PAM: We’ve Been Doing It All Wrong Martin Cannard, VP of Product Strategy at Netwrix The last two decades have seen massive change in the IT landscape: We’ve seen workloads shift from the datacenter to the cloud, applications move from... 2 weeks ago | 60 mins Four Ways to Mature Your Data Governance Myles Suer - Director, Solutions Marketing, Matt Sullivant - Product Manager, Ellen Snyder - Professional Services Principal Data governance has transformed. What once was a tedious compliance checkbox is today a means to accelerate growth, democratize data, and empower huma... 4 months ago | 59 mins How delivering empathy at scale transforms the bottom line Peter Dorrington, Chief Strategy Officer | Anthrolytics Ltd. The research is clear; when all other factors are roughly equal, empathy is the biggest driver of active loyalty. Customers who stay longer, buy more,... 2 weeks ago | 60 mins Empêchez la violation de la sécurité en bloquant les accès malveillants Anthony Moillic Field CISO EMEA & APAC, Netwrix; Loïc Veirman Expert de la securité des annuaires,MS-SEC Parce que le système informatique de l`entreprise ne peut pas être réputé inviolable, il est nécessaire de se donner les moyens de réagir avant qu’une... 1 month ago | 59 mins Load more