Latest articles
The Journey to File Permission Perfection
Jan 14, 2015
More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS,...
Interview With NYU-Poly’s Professor Justin Cappos: Security Lessons From Retail Breaches
Jan 06, 2015
I had the chance to talk with cyber security expert Justin Cappos last month about the recent breaches in the retail sector. Cappos is an Assistant Professor of Computer Science...
Microsoft Fixes A Kerberos Silver Ticket Vulnerability
Dec 29, 2015
Note: This post has created a bit of controversy among the security illuminati! A post on Still Passing the Hash Blog 15 Years Later explains the issues. I think a...
Office 365 Migration: Enterprise Guide and Best Practices
Dec 10, 2014
There are many factors to consider as you migrate your infrastructure to Office 365. Read this blog for several tip and things to think about.
Are You Smarter Than a Hacker? [CONTEST]
Nov 24, 2014
They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at...
Getting Started with PowerShell Option Inputs
Nov 17, 2014
PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization...
How to Be Your Own Best Password Generator
Nov 12, 2014
Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing...
Using PowerShell to Combat CryptoLocker
Oct 17, 2014
On the Varonis blog, we recently wrote about how CryptoLocker—the malware that encrypts your local files and holds them for a Bitcoin ransom—has better marketing than many companies. However, we...
How Can I Find Out Which Active Directory Groups I’m a Member Of?
Oct 09, 2014
The ability to administer and maintain up-to-date user lists and groups is critical to the security of an organization. There are a number of different ways to determine which groups...
What You May Have Missed
Sep 19, 2014
1. Here’s an interesting perspective from a CTO on why metadata matters. 2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect...
Phishing Attacks Classified: Big Phish vs. Little Phishes
Sep 16, 2014
The CMU CERT team I referred to in my last post also has some interesting analysis on the actual mechanics of these phishing attacks. Based on reviewing their incident database, the...
In Search of Kerberos’s Golden Ticket
Sep 05, 2014
In a Kerberos environment, all users get tickets, or more specifically TGTs (Ticketing Granting Tickets). It’s the starting point for gaining access to services—network files, email, apps, etc. In Windows,...
Try Varonis free.
Deploys in minutes.