-
Data Security
Jan 20, 2017
Connecting Your Data Strategy to Analytics: Eight Questions to Ask
Big data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science...
Michael Buckbee
3 min read
-
Data Security
Jan 12, 2017
How to setup a SPF record to prevent spam and spear phishing
Some things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid. When other things are combined...
Michael Buckbee
6 min read
-
Data Security
Dec 22, 2016
I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work
Alan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers....
Michael Buckbee
4 min read
-
Data Security
Dec 21, 2016
Ransomware: Legal Cheat Sheet for Breach Notification
You respond to a ransomware attack in many of the same ways you would to any other cyber attack. In short: have plans in place to analyze the malware, contain...
Michael Buckbee
3 min read
-
Data Security
Dec 08, 2016
New Mirai Attacks, But It’s Still About Passwords
Last week, Mirai-like wormware made the news again with attacks on ISPs in the UK. Specifically, customers of TalkTalk and PostOffice reported Internet outages. As with the last Mirai incident...
Michael Buckbee
3 min read
-
Data Security
Nov 30, 2016
PowerView Pen Testing
Pen Testing Active Directory Environments, PowerView, and how to go on the offensive with AD, take a look at our guide!
Michael Buckbee
4 min read
-
Data Security
Nov 21, 2016
Understanding SQL Injection, Identification and Prevention
When you think of a website getting hacked, you might picture someone in a hoodie in a high tech bunker (or their mom’s basement), wailing on a keyboard, controlling thousands...
Michael Buckbee
12 min read
-
Data Security
Nov 01, 2016
Overheard: "IT security has nothing to learn from the Mirai attack”
After my post last week on the great Mirai Internet takedown of 2016, I received some email in response. One of the themes in the feedback was, roughly, that ‘Mirai...
Michael Buckbee
3 min read
-
Data Security
Oct 27, 2016
The Mirai Botnet Attack and Revenge of the Internet of Things
Once upon a time in early 2016, we were talking with pen tester Ken Munro about the security of IoT gadgetry — everything from wireless doorbells to coffee makers and...
Michael Buckbee
5 min read
-
Data Security
Oct 25, 2016
NTFS Permissions vs Share: Everything You Need to Know
NTFS permissions are used to manage access to the files and folders that are stored in NTFS file systems. When you are using share and NTFS (NT File System) permissions together, the most restrictive permission wins.
Michael Buckbee
3 min read
-
Data Security
Oct 24, 2016
SQL Server Best Practices, Part II: Virtualized Environments
It is 2016 and some people still think SQL Server cannot be run on a virtual machine. SQL Server can successfully run in a VM but SQL is resource-intensive by...
Kieran Laffan
8 min read
-
Data Security
Oct 20, 2016
What is Privileged Access Management (PAM)?
Privileged access management is the process to monitor and secure your most sensitive user accounts. Keep reading to find out how to use PAM to keep your data safe.
Michael Buckbee
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital