-
Data Security
Mar 06, 2015
Public Versus Private Cloud File Sharing: Pros and Cons
In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same...
Michael Buckbee
3 min read
-
Data Security
Mar 03, 2015
How to Detect Dropbox on Your Network
The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list...
Michael Buckbee
1 min read
-
Data Security
Feb 26, 2015
Windows 10’s Security Reboot, Part I: Authentication
There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos....
Michael Buckbee
2 min read
-
Data Security
Feb 13, 2015
How to Detect and Clean CryptoLocker Infections
CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops...
David Gibson
4 min read
-
Data Security
Feb 11, 2015
Someone Deleted My File. How Can I Find Out Who?
If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you...
Michael Buckbee
1 min read
-
Data Security
Feb 05, 2015
Going Back To SQL Server 2008 In Order To Move Ahead
Last year, Microsoft ended its support for SQL 2008/R2. Customers with an enterprise agreement are still supported, but it’s a good idea to start planning your upgrade. Upgrading your production...
Michael Buckbee
2 min read
-
Data Security
Feb 02, 2015
PCI DSS Explained: Our New White Paper Decodes the Complexity
The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide...
David Gibson
1 min read
-
Data Security
Jan 14, 2015
The Journey to File Permission Perfection
More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS,...
Michael Buckbee
6 min read
-
Data Security
Jan 06, 2015
Interview With NYU-Poly’s Professor Justin Cappos: Security Lessons From Retail Breaches
I had the chance to talk with cyber security expert Justin Cappos last month about the recent breaches in the retail sector. Cappos is an Assistant Professor of Computer Science...
Michael Buckbee
7 min read
-
Data Security
Dec 29, 2015
Microsoft Fixes A Kerberos Silver Ticket Vulnerability
Note: This post has created a bit of controversy among the security illuminati! A post on Still Passing the Hash Blog 15 Years Later explains the issues. I think a...
Michael Buckbee
4 min read
-
Data Security
Nov 24, 2014
Are You Smarter Than a Hacker? [CONTEST]
They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at...
Michael Buckbee
3 min read
-
Data Security
Nov 17, 2014
Getting Started with PowerShell Option Inputs
PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization...
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital