-
Active Directory
Aug 25, 2021
Securing Azure Blob Storage: Set-Up Guide
Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been followed. One particular cloud service that is often misconfigured is cloud storage like Azure Blob storage.
Jeff Brown
7 min read
-
Aug 24, 2021
Azure CLI Overview: Setup, Comparison, and Integration Tips
If you are just learning about Azure, most likely you are working in the Azure Portal. You have probably created resources like virtual machines and storage accounts by using the deployment wizards. However, this process is tedious and doesn’t scale when you need to create lots of resources. If you want to take your Azure resource deployment to the next level, it is time to look at the Azure CLI!
Jeff Brown
7 min read
-
Cloud Security
Aug 24, 2021
Introduction to AWS DevOps: Skills + Tools You Need
What is AWS Devops? AWS provides a set of flexible services designed to enable organizations to build and deliver products faster and more reliably by implementing DevOps practices.
Meenakshi Kasi
8 min read
-
Data Security
Aug 18, 2021
How to Fix Broken Registry Items: Visual Guide and Solutions
Broken Registry Items have been the thorn in many an IT admin’s side almost since the day Microsoft introduced the Registry concept in Windows 3.1. Modern flavors of Windows tend to do a good job of maintaining the registry on their own, but there may still be some limited circumstances where broken registry items can cause issues. If you’re wondering ‘how to repair broken registry items’, read through the rest of this guide to learn what a broken registry item is, what symptoms it may cause, and how to fix it.
Robert Grimmick
7 min read
-
Ransomware
Aug 16, 2021
What is Ransomware? Types and Definitions of Ransomware Attacks
In this article, we’ll define ransomware, explore the different types of ransomware and the risks associated, and discuss how you can protect yourself from ransomware attacks. You’ll learn how ransomware works and what each various attack is seeking to accomplish. We’ll also put things into context in terms of real-world attacks like the recent one affecting Colonial Pipeline. And with a handy glossary at the end, you’ll be well informed and equipped with all the information you need about how ransomware works.
David Harrington
7 min read
-
Data Security
Aug 16, 2021
Last Week in Ransomware: Week of August 16th
Phishing attacks are one common vector used to gain access to a network for ransomware attacks and it seems there might be yet another way to hide these phishing attacks using old school Morse code. But Phishing should be your only security concern.
Michael Raymond
1 min read
-
Data Security
Aug 11, 2021
Think Your Data Is Secure? Three Questions You Need To Answer Right Now
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.
Yaki Faitelson
3 min read
-
Data Security
Aug 09, 2021
Understand and Implement Azure Monitor for Monitoring Workloads
You always want your business-critical production applications to run without issues or downtime. To achieve this you need to continuously analyze system logs, monitor your application and their dependent services to identify and remediate any issues.
Neeraj Kumar
7 min read
-
Data Security
Aug 09, 2021
Last Week in Ransomware: Week of August 9th
DarkSide and REvil might not be as done as we originally imagined, the new BlackMatter group has emerged claiming to be their successor. And it’s not all just words, they’ve developed a Linux version of their ransomware designed to Target VMWare’s ESXi VM platform.
Michael Raymond
1 min read
-
Data Security
Aug 05, 2021
Packet Capture: What is it and What You Need to Know
Packet capture is a vital tool used to keep networks operating safely and efficiently. In the wrong hands, it can also be used to steal sensitive data like usernames and passwords. In this post, we’ll dive into what a packet capture is, how it works, what kind of tools are used, and look at some sample use cases.
Robert Grimmick
9 min read
-
Data Security
Aug 05, 2021
How to Investigate NTLM Brute Force Attacks
Objective Malicious actors routinely use the NTLM authentication protocol to carry out account enumeration and brute force-styled attacks to compromise accounts within a victim’s network. Once inside, an attacker can gain persistence, exfiltrate sensitive data, and unleash ransomware.
Ed Lin
6 min read
-
Data Security
Aug 04, 2021
Your Comprehensive Guide to Salesforce Shield
For the seventh consecutive year, Salesforce maintains the lion’s share of the CRM ecosystem worldwide. Salesforce comprises 20% of all CRM instances worldwide used to manage and process customer data. Businesses looking to secure their customer data and maintain compliance have a diverse set of security options available. One of most compelling of these options, however, resides within the Salesforce ecosystem itself: Salesforce Shield.
Renganathan Padmanabhan
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital