Kieran Laffan
Although Irish by birth, Kieran joined Varonis as an Enterprise Solutions Architect for Western Canadian before moving to California to run our Security Architecture Team. Alas, the call of the emerald isle become too strong, and Kieran moved back home to Ireland. After a few years as the IT Security, Risk, and Compliance Manager of a European Reinsurance Group he rejoined Varonis where he now runs the Sales Engineering team supporting our European SMB customers, based out of our European HQ, in Cork, Ireland.
-
Data Security
May 20, 2017
EternalRocks leaves backdoor trojan for remote access to infected machines
What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1 file sharing protocol.
Kieran Laffan
2 min read
-
Data Security
May 15, 2017
Why did last Friday's ransomware infection spread globally so fast?
Quick ransomware background Ransomware is a type of malware that encrypts your data and asks for you to pay a ransom to restore access to your files. Cyber criminals usually request that the ransom be paid in Bitcoins: the #1 cryptocurrency (basically a distributed ledger) which can be used to buy and sell goods. By nature, Bitcoin transactions (e.g. ransom payments) are very difficult to trace.
Kieran Laffan
3 min read
-
Data Security
Nov 29, 2016
Why UBA Will Catch the Zero-Day Ransomware Attacks (That Endpoint Protection Can’t)
Ransomware attacks have become a major security threat. It feels like each week a new variant is announced –Ransom32, 7ev3n. This malware may even be involved in the next big breach. New variants such as Chimera threaten to not just ransom your data, but also leak it online if you don’t pay up.
Kieran Laffan
2 min read
-
Data Security
Oct 24, 2016
SQL Server Best Practices, Part II: Virtualized Environments
This article is part of the series "SQL Server Best Practices". Check out the rest: Part I: Configuration Part II: Virtualized Environments
Kieran Laffan
8 min read
-
Data Security
Aug 02, 2016
SQL Server Best Practices, Part I: Configuration
This article is part of the series "SQL Server Best Practices". Check out the rest: Part I: Configuration Part II: Virtualized Environments
Kieran Laffan
7 min read
-
Data Security
Nov 10, 2015
A Brief History of Ransomware
Ransomware’s Early Days The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS Cyborg1. Harvard-trained evolutionary biologist Joseph L. Popp sent 20,000 infected diskettes labeled “AIDS Information – Introductory Diskettes” to attendees of the World Health Organization’s international AIDS conference.
Kieran Laffan
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital