-
Data Security
Jan 05, 2021
What Is Network Segmentation?
Simply put, network segmentation is the act of dividing a computer network into smaller physical or logical components.
Robert Grimmick
4 min read
-
Data Security
Dec 23, 2020
Phishing Attacks: Types, Prevention, and Examples
Phishing attacks. They’re ubiquitous, easy to carry out, and at the root of some of the most devastating cyberattacks in history. Phishing is a type of social engineering attack, employing deceit and coercion to trick a user into revealing sensitive information or downloading malware. Those pesky fake emails pretending to be from your bank might seem like a mere annoyance, but phishing has very real implications for companies, governments, and other types of organizations. In fact, Verizon’s 2021 Data Breach Investigation Report (DBIR) lists phishing as the most common tactic seen in confirmed breaches. According to Symantec, one in 2,000 emails are phishing attacks, which means there are 135 million phishing attacks every day [1].
Robert Grimmick
9 min read
-
Data Security Privacy & Compliance
Dec 22, 2020
5 Priorities for the CISO Budget In 2021
“Take the CISO job,” they said. “It’ll be great,” they said.
Michael Buckbee
8 min read
-
Threat Research
Dec 18, 2020
SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign
Imagine if everyone with an Amazon Echo in their home had to assume it’s been unlocking their doors and letting a thief inside for the past 6 months. How would you figure out what’s missing if they copied your keys, your hard drives, or whatever is in your file cabinet, poisoned your water supply?
Snir Ben Shimol
6 min read
-
PowerShell
Dec 03, 2020
How to Connect to Office 365 PowerShell: Azure AD Modules
This post will cover how to connect PowerShell to Office 365 (Azure Active Directory (Azure AD)), which manages Microsoft 365 tenant identities and licenses. I will also cover connecting to other services and products in Microsoft 365, such as Exchange, SharePoint, and Microsoft Teams.
Jeff Brown
7 min read
-
Threat Research
Dec 02, 2020
November 2020 Malware Trends Report
Malware Overview This Malware Trends Report – November 2020 is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
4 min read
-
Data Security
Nov 23, 2020
What is a Port Scanner and How Does it Work?
A port scanner is a computer program that checks network ports for one of three possible statuses – open, closed, or filtered.
Michael Buckbee
7 min read
-
Data Security
Nov 23, 2020
What is Role-Based Access Control (RBAC)?
Role-Based Access Control (RBAC) is a security paradigm whereby users are granted access to resources based on their role in the company. RBAC, if implemented correctly, can be an effective way of enforcing the principle of least privilege.
Michael Buckbee
8 min read
-
Data Security
Nov 17, 2020
Netwalker Ransomware Guide: Everything You Need to Know
Emotet, Trickbot, Maze, Ryuk, and now Netwalker ransomware— cybercrime has increased exponentially in the last year. Ransomware has been a serious plight across industries big and small, public and private, with no sign of letting up.
Nathan Coppinger
7 min read
-
Data Security
Nov 16, 2020
The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files
Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email, attackers will move into action fast – and they’ll be able to copy, change, encrypt or delete any files the victim can touch. Pretty scary, huh?
Rachel Hunt
1 min read
-
Data Security
Nov 13, 2020
Finding Data Owners with Varonis
Unstructured data governance can be a chaotic mess. A new employee has access to 17,000,000 files the moment they walk in the door. Unmanaged data access represents a considerable risk to data security, which is why we built DataPrivilege and invented a methodology to define data owners to address this risk.
Michael Buckbee
4 min read
-
Data Security
Nov 11, 2020
What is an Incident Response Plan and How to Create One
An incident response plan ensures that in the event of a security breach, the right personnel and procedures are in place to effectively deal with a threat. Having an incident response plan in place ensures that a structured investigation can take place to provide a targeted response to contain and remediate the threat.
Neil Fox
10 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital