Tag: Security risks
October 23, 2020 |
Security Analytics
As cybersecurity threats evolve, companies must adapt and rethink their security strategies. This means moving away from traditional technologies and towards new cybersecurity frameworks. One such framework is the NIST cybersecurity framework, which comprises five major functions:
Identify
...
September 10, 2020 |
Cloud Challenges by the Numbers: Adoption and Configuration
The year 2020 has shown us that cloud computing is among the most powerful capabilities humanity has, enabling people around the globe continue their everyday business and education uninterrupted. We continue gathering the most interesting findings from industry research. If you’re interested in...
July 24, 2020 |
Quantitative Risk Analysis: Annual Loss Expectancy
Risk assessment is an essential component of risk management. It enables you to determine potential hazards that may negatively affect specific projects or result from certain decisions.
There are two types of risk analysis — quantitative and qualitative:
Quantitative risk analysis is an...
June 25, 2020 |
2020 State of the Cloud Statistics
Cloud Usage
The cloud had become mainstream during the last couple of years, but the year of 2020 has pushed companies to adapt to remote working, which immediately led to a rapid adoption of cloud services. Research indicates that overall use of cloud services across industries has already...
June 10, 2020 |
Cybersecurity Assessment: Definition and Types
According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches of these vulnerabilities cost large enterprises $3.92 million on average; for 60% of those breaches,...
May 29, 2020 |
Improving Security through Vulnerability Management
The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
April 7, 2020 |
Risk Analysis Example: How to Evaluate Risks
Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk analysis focuses on the risks that both internal and external threats pose to the...
March 20, 2020 |
Beginner’s Guide to IT Risk Management
Managing risk is at the heart of every enterprise. Decisions about finance, marketing, expansion and human resources all include some level of risk.
When enterprises evaluate their IT-related risks, factors that come into play include security, access, data handling and regulatory compliance...
November 21, 2019 |
Top IT Priorities for 2020
In October 2019, Netwrix asked IT pros to name the five IT projects that will be their top priorities in 2020. We got feedback from 846 respondents worldwide. This is what we learned from their responses.
According to the Netwrix IT Trends 2020 report, data security takes the gold medal as the...
March 12, 2019 |
Five Mistakes that Could Lead to a Third-Party Data Breach
In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...