Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... March 22, 2023 3:00pm Implementing a Least Privilege Management Framework on Windows and macOS Devices Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) The crux of every cyberattack’s success or failure today is privileges – without them, the threat actor has no ability to execute anything, move later... March 29, 2023 9:00am Privilege vs Productivity: How to Elevate Local Admin Rights Securely Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) Business and technical end-users often require local admin rights to perform tasks or access applications. Adding standard users to the local administ... April 4, 2023 6:00pm PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... April 5, 2023 9:00am PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... April 11, 2023 6:00pm Las Vegas secures a connected ecosystem with a modern approach to access control Michael Sherwood, Chief Innovation and Technology Officer, City of Las Vegas 55% of the world’s population lives in urban areas, with 68% projected to live in urban areas by 2050. As such, cities represent perhaps the most impo... March 28, 2023 4:00pm Zero Trust-based Remote Access for Operational Cybersecurity Col. Jennifer Krolikowski, Chief Information Officer, Space Systems Command Zero Trust Network Access (ZTNA) solutions brought simplicity, scalability and more security for IT remote access use cases. This is long overdue for ... 1 week ago | 62 mins Modern Nux Security and Least Privilege CyberArk "The MITRE ATT&CK 11.2 framework for Linux was just released, a hallmark of the expanded Linux attack surface at the hands of today’s threat actors. F... 1 month ago | 47 mins Zero Trust Initiatives For Identity-First Cyber Resiliency Tim Keeler, General Manager/CTO, Remediant, a Netwrix Company In 2023, the Zero Trust concept permeates cybersecurity departments across private and public organizations alike. When it comes to identity access ma... 1 month ago | 42 mins From Zero to Immediate Impact with Foundational Endpoint Security CyberArk "Is your current endpoint security posture leaving the door open for attackers? Many organizations don’t have adequate privilege, credential and ident... 1 month ago | 25 mins Load more