-
Data Security
Sep 09, 2022
What Is a Data Leak? Definition and Prevention Tips
A data leak can result in serious financial, reputational, and legal repercussions, whether caused by employee negligence, an insider threat, or a hack. When sensitive data is exposed, everything from social security numbers to health records can end up in the wrong hands.
Nolan Necoechea
4 min read
-
Data Security
Sep 09, 2022
What Is Zero Trust? Architecture and Security Guide
Developed by renowned analyst John Kindervag, Zero Trust is a strategic cybersecurity model that protects critical systems and data. Systems operating under a Zero Trust framework do not initially trust access or transactions from anyone — including internal users behind the firewall — and limit data access to minimize the blast radius of a cyber attack.
Michael Buckbee
8 min read
-
Privacy & Compliance
Sep 02, 2022
U.S. Privacy Laws: The Complete Guide
The United States has a patchwork and ever-changing web of laws governing data privacy. While there’s no comprehensive federal privacy decree, several laws do focus on specific data types or situations regarding privacy.
David Harrington
9 min read
-
Privacy & Compliance
Aug 26, 2022
SOC 2 Compliance Definition & Checklist
One of the essential aspects of conducting any business is protecting customers' data. As a result, companies must comply with System and Organization Controls (SOC 2) to ensure their organization follows the best data security practices. But what is SOC 2 compliance? And how can you be sure you’re doing everything necessary to achieve SOC 2 compliance?
David Harrington
6 min read
-
Data Security
Aug 26, 2022
What is Mimikatz? The Beginner's Guide
Benjamin Delpy originally created Mimikatz as a proof of concept to show Microsoft that its authentication protocols were vulnerable to an attack. Instead, he inadvertently created one of the most widely used and downloaded threat actor tools of the past 20 years.
Michael Buckbee
4 min read
-
Threat Research
Aug 22, 2022
Anatomy of a SolidBit Ransomware Attack
Appearing as a relatively new ransomware threat, only active since roughly July 2022, the root of SolidBit can be traced to a family of ransomware builders that have been through a number of iterations and name changes since being first observed in June 2021.
Jason Hill
6 min read
-
Data Security
Aug 19, 2022
How to Use Wireshark: Comprehensive Tutorial + Tips
If you find yourself troubleshooting network issues, and you have to inspect individual packets, you need to use Wireshark. Wireshark is the de facto, go-to, you-need-to-know-how-to-use, application to capture and investigate network traffic.
Kody Kinzie
7 min read
-
Salesforce
Aug 18, 2022
Your Sales Data Is Mission-Critical: Are You Protecting It?
Let’s say your top sales manager leaves your company to join a competitor. You expect they’ll take their relationships with them, but will they take your sales data, too?
Yaki Faitelson
3 min read
-
Varonis Products
Aug 17, 2022
Varonis Maps Cloud Security Alerts to MITRE ATT&CK
In Varonis’ latest update of DatAdvantage Cloud, we’re layering MITRE ATT&CK tactics and techniques over our cloud alerts to aid in faster incident response. Mapping alerts to MITRE ATT&CK helps security teams better understand the alert's context, impact, and phase. Additionally, it can help inform how best to guard against attacks in the future.
Yumna Moazzam
2 min read
-
Cloud Security
Jul 22, 2022
How to Create S3 Buckets in AWS with CloudFormation: Step-by-Step Guide
Amazon Web Services (AWS) Simple Storage Service (S3) enables users to organize and manage data in logical containers known as “buckets”. AWS continues to improve and simplify the bucket creation and configuration process, from simply clicking “Create bucket” in the user interface to enabling creation and configuration through code, via CloudFormation. This article will walk you through how to create S3 buckets via CloudFormation, allowing you to reap the benefits of Infrastructure as Code (IaC) practices.
Shane Waterford
6 min read
-
Data Security
Jul 22, 2022
What Is SQL Injection? Identification & Prevention Tips
SQL injection is among the top 10 open web application security project (OWASP) vulnerabilities. Applications tend to be at risk of high-profile vulnerabilities like SQL injection attacks. The results of a SQL injection attack vary, ranging from retrieving confidential data to altering an application’s logic.
Alvin Mwambi
6 min read
-
Privacy & Compliance
Jul 22, 2022
What Is a Privacy Impact Assessment (PIA)?
No matter what industry you work in, chances are you handle sensitive information. Whether it involves customers, vendors, government agencies, or third parties, data such as social security numbers and medical records are generated, stored, and transmitted every second of every day. Keeping private information private can be a considerable challenge, which is why many organizations today perform a privacy impact assessment (PIA).
David Harrington
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital