Featured Content

AI Security

Nolan Necoechea

Nolan Necoechea
Threat Research

Oren Bahar
Cloud Security

Yaki Faitelson
Data Security

Avia Navickas
-
Data Security
Oct 20, 2016
What is Privileged Access Management (PAM)?
Privileged access management is the process to monitor and secure your most sensitive user accounts. Keep reading to find out how to use PAM to keep your data safe.
Michael Buckbee
5 min read
-
Privacy & Compliance
Oct 11, 2016
The Federal Trade Commission Likes the NIST Cybersecurity Framework (and You Should Too)
Remember the Cybersecurity Framework that was put together by the folks over at the National Institute of Standards and Technology (NIST)? Sure you do! It came about because the US...
Michael Buckbee
2 min read
-
Data Security
Oct 06, 2016
When a Cyber Attack Is a Political Weapon
We’re not surprised when hackers attack companies to scoop up credit card numbers or to cause IT disruption. If they’re state sponsored, they may target organizations to pull out intellectual...
Michael Buckbee
3 min read
-
Data Security
Sep 29, 2016
How to setup your DNS Server like North Korea
I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your shoulder, touches...
Michael Buckbee
2 min read
-
Data Security
Sep 16, 2016
The Difference Between SSL and TLS
SSL and TLS are used interchangably in conversations as they are incredibly closely related. Knowing the subtle difference is key.
Michael Buckbee
2 min read
-
PowerShell
Sep 13, 2016
The Difference Between Bash and Powershell
You don’t normally talk philosophy and IT when considering Bash and Powershell, but if it’s one thing I’ve learned over the past 20 years of sysadmin work it’s that whether...
Michael Buckbee
2 min read
-
PowerShell
Sep 06, 2016
The Complete PowerShell Tool Roundup
A hand-curated list of 70 tools to power up your workflow.
Michael Buckbee
3 min read
-
Data Security
Sep 06, 2016
The Vulnerability of Things - IOSS 21
We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...
Michael Buckbee
1 min read
-
Data Security
Aug 31, 2016
Malware Coding Lessons for IT People, Part II: Fun With FUD Ransomware!
Let’s not overthink ransomware! It’s just a small malicious piece of code with one devious goal — encrypting all of the user’s important files. It the unfortunate victim wants to...
Oded Awaskar
4 min read
-
Privacy & Compliance
Aug 23, 2016
HHS to Investigate Smaller HIPAA Privacy Breaches
As a reader of this blog, you know all about Health and Human Services’ (HHS) wall of shame. That’s where breaches involving protected health information (PHI) affecting 500 or more...
Michael Buckbee
1 min read
-
Data Security
Aug 19, 2016
New SamSam Ransomware Exploiting Old JBoss Vulnerability
One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware...
Michael Buckbee
1 min read
-
Data Security
Aug 17, 2016
Six Authentication Experts You Should Follow
Our recent ebook shows what’s wrong with current password-based authentication technology. But luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people...
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital