BY: KODY KINZIE UPDATED: 3/29/2020 A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by
TOP STORIES

What is an IT Security Audit? The Basics
BY: JEFF PETTERS UPDATED: 3/29/2020 A security audit is the high-level description of the many ways organizations can test and assess

Top 5 Remote Work Security Threats
BY: JEFF PETTERS UPDATED: 8/12/2020 Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security

DNS Security Guide
BY: JEFF PETTERS UPDATED: 7/28/2020 What is DNS Security? DNS Security Considerations + Components DNS Attacks What is DNSSEC? DNS

Data Breach Response: Top Tips for Businesses
Ilia Sotnikov, VP of Product Management at Netwrix Since the coronavirus pandemic forced organisations to implement remote working models and
Current Attack Trends on Organizations
Of the many threats that industry spanning worldwide organizations face and continue to be on the uprise, the most common

Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets
Rising supply chain attacks mean organizations must tread carefully when buying IT—even from trusted suppliers. Data erasure can help. While

