Rob Sobers

Latest articles

What Does it Take to Be an Ethical Hacker?

Rob Sobers

Rob Sobers

A white hat hacker, or an ethical hacker, works with agencies and organizations to discover network vulnerabilities and security flaws. Learn what it takes to make hacking your profession with our guide!

The Anatomy of a Phishing Email

Rob Sobers

Rob Sobers

Have you been hooked by a phishing email? We’ve broken out the most common components of a phishing email. Check out our full guide to test your knowledge!

🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know

Rob Sobers

Rob Sobers

On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed...

Reality Leah Winner and the Age of Insider Threats

Rob Sobers

Rob Sobers

Prosecutors allege that 25-year-old federal contractor Reality Leah Winner printed a top-secret NSA document detailing the ongoing investigation into Russian election hacking last November and mailed it to The Intercept....

What is a Data Security Portfolio?

Rob Sobers

Rob Sobers

A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools to reduce risk and prevent threats.

21 Free Tools Every SysAdmin Should Know

Rob Sobers

Rob Sobers

Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...

The Difference Between Active Directory and LDAP

Rob Sobers

Rob Sobers

A quick, plain-English explanation. Active Directory is a directory service made by Microsoft, and LDAP is how you speak to it. 

Football player hacked live during NFL draft

Rob Sobers

Rob Sobers

Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from...

3 Deadly File Permissions Mistakes

Rob Sobers

Rob Sobers

Scarily, in most organizations people have access to much more information than they need in order to do their jobs.  With file permissions, it’s easy to mess things up and...

How to Configure Varonis and EMC Isilon

Rob Sobers

Rob Sobers

Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc.  Varonis is the perfect fit.  With our...

CIFS vs SMB: What's the Difference?

Rob Sobers

Rob Sobers

CIFS, SMB, Samba, and NFS are technolgies used to network client and server systems. Learn the difference between them and which to use when.

8 Things to Look for in File Auditing Software

Rob Sobers

Rob Sobers

Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.