-
Data Security
Aug 04, 2021
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Two-factor authentication (2FA) is one of the most effective ways to reduce the risk of your employees falling victim to an account takeover, potentially exposing your organization’s sensitive assets and accounts.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Threat Modeling and How To Choose the Right Framework
Threat modeling is a key responsibility for any cybersecurity team that is looking to protect their organization and their organization’s assets. It’s designed to help cybersecurity teams proactively find and identify potential risks and threats, working through scenarios, response models, and other forms of threat detection.
Josue Ledesma
5 min read
-
Jul 29, 2021
2021 SaaS Risk Report Reveals 44% of Cloud Privileges are Misconfigured
Cloud apps make collaboration a breeze, but unless you’re keeping a close watch on identities, behavior, and privileges across each and every SaaS and IaaS you rely on, you’re a sitting duck.
Rob Sobers
1 min read
-
Security Bulletins
Jul 26, 2021
Memory Forensics for Incident Response
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform some analysis to identify potential malware and gather IOC’s which can then be used to identify other compromised devices.
Neil Fox
6 min read
-
Privacy & Compliance
Jul 26, 2021
What is PSD2 Compliance and What Does it Mean for Your Business?
One of the newest regulations for payment services and processors is the European Union’s Payment Services Directive or PSD2. The PSD2 began taking effect in September of 2018 and is designed to boost digital banking innovation while increasing security and consumer rights. Although PSD2 is an EU regulation, it’s expected to have a major impact on how banks, payment processors, and fintech firms do business globally.
David Harrington
5 min read
-
Data Security
Jul 26, 2021
Last Week in Ransomware: Week of July 26th
In previous weeks we mentioned that the group behind the REvil ransomware attack has vanished from the internet, which makes it particularly surprising that a universal decryption key has been released this week. The key should allow all the victims that didn’t have backups to unlock their files. The mysterious appearance of this key has led to wild speculation including the possibility of the Russian government’s involvement or the payment of the $70 million Ransom.
Michael Raymond
1 min read
-
Data Security
Jul 20, 2021
What is a Brute Force Attack?
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. 5% of confirmed data breach incidents in 2017 stemmed from brute force attacks.
Michael Buckbee
4 min read
-
Privacy & Compliance
Jul 20, 2021
What is PCI Compliance: Requirements and Penalties
PCI compliance is a set of standards and guidelines for companies to manage and secure credit card related personal data. The major credit card companies – Visa, Mastercard, and American Express – established Payment Card Industry Data Security Standards (PCI DSS) guidelines in 2006 in an effort to protect credit card data from theft.
Michael Buckbee
4 min read
-
Data Security
Jul 19, 2021
Last Week in Ransomware: Week of July 19th
This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.
Michael Raymond
2 min read
-
Data Security
Jul 19, 2021
Data Migration Guide: Strategy Success & Best Practices
For most businesses, data migration is a necessary business process that takes place on a regular basis. Whether it’s implementing a new system or shifting information to more secure storage locations, having a solid data migration strategy that helps organizations is imperative for executive and information technology teams.
Michael Buckbee
7 min read
-
Data Security
Jul 07, 2021
Everything You Need to Know About Cyber Liability Insurance
Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity threats. While prevention is an important aspect, there’s no tool, solution, or strategy that’s 100% guaranteed to prevent a company from succumbing to a potential attack.
Josue Ledesma
4 min read
-
Cloud Security
Jul 07, 2021
How to Set Up AWS IAM: Elements, Features, & Components
Amazon Web Services (AWS) offers IT infrastructure services (IaaS-Infrastructure as a Service) to businesses in the form of web services commonly known as cloud computing. AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses. AWS IAM is a web service that helps you securely control access to Amazon resources.
Meenakshi Kasi
10 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital