Latest articles
Practical PowerShell for IT Security, Part IV: Security Scripting Platform (SSP)
May 10, 2017
In the previous post in this series, I suggested that it may be possible to unify my separate scripts — one for event handling, the other for classification — into...
Introducing the Automation Engine, DatAlert Analytics Rewind, and more
May 05, 2017
Getting to least privilege can be a nightmare. The first steps – tracking down inconsistent ACLs and remediating global access groups can turn even the most basic file share clean-up...
Varonis + Splunk: Epic Threat Detection and Investigations
Apr 26, 2017
We’re bringing our powerful DatAlert functionality to Splunk® Enterprise to give you comprehensive visibility into data security with our new Varonis App fo
Data Security Compliance and DatAdvantage, Part III: Protect and Monitor
Apr 20, 2017
At the end of the previous post, we took up the nuts-and-bolts issues of protecting sensitive data in an organization’s file system. One popular approach, least-privileged access model, is often...
Data Security Compliance and DatAdvantage, Part II: More on Risk Assessment
Apr 14, 2017
I can’t really overstate the importance of risk assessments in data security standards. It’s really at the core of everything you subsequently do in a security program. In this post...
Practical PowerShell for IT Security, Part III: Classification on a Budget
Apr 05, 2017
Last time, with a few lines of PowerShell code, I launched an entire new software category, File Access Analytics (FAA). My 15-minutes of fame is almost over, but I was...
Data Security Compliance and DatAdvantage, Part I: Essential Reports for Risk Assessment
Apr 03, 2017
Over the last few years, I’ve written about many different data security standards, data laws, and regulations. So I feel comfortable in saying there are some similarities in the EU’s...
Practical PowerShell for IT Security, Part II: File Access Analytics (FAA)
Mar 22, 2017
In working on this series, I almost feel that with PowerShell we have technology that somehow time-traveled back from the future. Remember on Star Trek – the original of course...
Cybercrime Laws Get Serious: Canada’s PIPEDA and CCIRC
Mar 20, 2017
In this series on governmental responses to cybercrime, we’re taking a look at how countries through their laws are dealing with broad attacks against IT infrastructure beyond just data theft....
Varonis eBook: Pen Testing Active Directory Environments
Mar 16, 2017
You may have been following our series of posts on pen testing Active Directory environments and learned about the awesome powers of PowerView. No doubt you were wowed by our cliffhanger...
Practical PowerShell for IT Security, Part I: File Event Monitoring
Mar 08, 2017
Back when I was writing the ultimate penetration testing series to help humankind deal with hackers, I came across some interesting PowerShell cmdlets and techniques. I made the remarkable discovery...
Cloudbleed - Cloudflare Unauthorized Data Leak
Feb 24, 2017
Cloudflare is a huge internet infrastructure company (5.5 million websites), which means that you likely use them every day that you’re online, without ever realizing it. Depending on what metric...
Try Varonis free.
Deploys in minutes.