-
Data Security
May 11, 2021
How to Use Azure Sentinel for Security Analytics and Threat Intelligence
Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the systems in order to smartly combat and respond to the increasingly sophisticated attacks. This is where Azure Sentinel comes into the picture.
Neeraj Kumar
9 min read
-
Data Security
May 07, 2021
What is an SMB Port + Ports 445 and 139 Explained
The SMB protocol enables “inter-process communication,” which is the protocol that allows applications and services on networked computers to talk to each other. SMB enables the core set of network services such as file, print, and device sharing.
Michael Buckbee
2 min read
-
Data Security
Apr 27, 2021
5 Data Governance Reports for Data Owners
This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule, and interpret these reports.
Michael Buckbee
3 min read
-
Data Security
Apr 27, 2021
ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks
ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll take a quick look at the need for ARP, the weaknesses that enable ARP Poisoning, and what you can do to keep your organization safe.
Robert Grimmick
8 min read
-
Data Security
Apr 26, 2021
What is C2? Command and Control Infrastructure Explained
A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence within the target environment, communicate with infected or compromised devices inside the network, and potentially exfiltrate sensitive data. The key to accomplishing all these tasks is a robust Command and Control Infrastructure or “C2”. What is C2? In this post, we’ll answer that question and look at how adversaries use these covert channels of communication channels to carry out highly sophisticated attacks. We’ll also look at how to spot and defend against C2-based attacks.
Robert Grimmick
7 min read
-
Data Security
Apr 23, 2021
Permission Propagation: Info and Tips
Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all of the folders under that folder in the tree.
Brian Vecci
4 min read
-
Data Security
Apr 07, 2021
How Varonis Limits Organization-Wide Exposure
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available to all employees creates organization-wide exposure (OWE), making the likelihood of a devastating breach skyrocket.
Michael Buckbee
6 min read
-
Data Security Privacy & Compliance
Apr 02, 2021
Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential
The world has never been more interconnected, with cloud and digital technology allowing companies to flourish and succeed globally. However, this interconnectedness comes with elevated risk — partners, vendors, and third parties can expose companies and malicious hackers are known to target organizations through their supply chain. As a result, supply chain risk management has become a critical component of any company’s risk management and cybersecurity strategy.
Josue Ledesma
5 min read
-
Data Security Privacy & Compliance
Apr 01, 2021
Using Salesforce Analytics for GDPR Compliance
272 million Euros. That is the total amount in fines imposed by the European Union on businesses for non-compliance to GDPR, data infringement, and breaches on data protection since the launch of the GDPR act in May 2018. It should come as no surprise that businesses, big or small, have been setting aside enormous time and investment in their IT systems to ensure that they have been able to satisfy the strictest of GDPR regulations. A bulk of these investments are allocated to secure and manage their source of truth for customer data across their IT landscape. Considering the state of the market in 2020-2021, that happens to be on Salesforce.
Renganathan Padmanabhan
4 min read
-
Data Security
Apr 01, 2021
Endpoint Detection and Response: All You Need to Know About EDR Security
Endpoints – the laptops, smartphones, and other devices we use on a daily basis – are a favorite target of attackers. They’re everywhere, prone to security vulnerabilities, and difficult to defend. 2017’s WannaCry attack, for example, is reported to have affected more than 230,000 endpoints across the globe. Endpoint Detection and Response (EDR) is a fast-growing category of solutions that aim to provide deeper capabilities than traditional anti-virus and anti-malware solutions. In this piece, we’ll learn what EDR is and why it’s important, discover how EDR security solutions operate and examine some best practices for using these tools.
Robert Grimmick
6 min read
-
Data Security
Apr 01, 2021
How to Create and Manage the Azure Network Watcher Resource
The Azure Network Watcher provides monitoring and logging for Infrastructure-as-a-Service (IaaS) resources in Azure virtual networks. Azure automatically deploys the Azure Network Watcher when you create or update an Azure virtual network in your subscription. However, if you’re not sure what the resource is, you may end up deleting it not knowing it is an essential function.
Jeff Brown
6 min read
-
Data Security
Apr 01, 2021
Docker vs. Kubernetes
A common crossroad for developers (especially when just starting) concerning containerization is the question of Kubernetes vs Docker. In this post, we will exhaust the fork down to application areas for which either side fits perfectly.
Taurai Mutimutema
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital