-
Data Security
Apr 06, 2020
What is PGP Encryption and How Does It Work?
Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto standard for email security.
Michael Buckbee
9 min read
-
Data Security
Apr 06, 2020
COVID-19 THREAT UPDATE #4
Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand.
Kilian Englert
1 min read
-
Data Security
Apr 01, 2020
What is Fileless Malware? PowerShell Exploited
Fileless malware most commonly uses PowerShell to execute attacks on your system without leaving any traces. This type of attack is also known as a zero-footprint attack and can be particularly hard to detect because it does not rely on infiltrating external malicious (and detectable) binaries into your systems. Rather, it uses your own tools against you.
Michael Buckbee
8 min read
-
Data Security
Apr 01, 2020
Top 5 Remote Work Security Threats
Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security best practices often take a back seat to business continuity in strange times like these. Teams that previously managed a primarily in-house workforce might not be prepared to combat new threats from a workplace without defined borders.
Michael Buckbee
5 min read
-
Data Security
Mar 31, 2020
COVID-19 Threat Update #3
If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files in the cloud presents new challenges for a lot of companies — and attackers are taking advantage.
Kilian Englert
1 min read
-
Active Directory
Mar 29, 2020
Active Directory Users and Computers (ADUC): Installation and Uses
Active Directory Users and Computers (ADUC) is a Microsoft Management Console snap-in that you use to administer Active Directory (AD). You can manage objects (users, computers), Organizational Units (OU), and attributes of each.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses
It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP), as it did with the newly discovered BlueKeep vulnerability you’d think companies would have learned by now the first commandment of infosec: thou shalt not expose RDP on the public Internet.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
CryptoLocker: Everything You Need to Know
What is CryptoLocker? CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “holds them for ransom”, prompting any user that tries to open the file to pay a fee to decrypt them. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”
Michael Buckbee
5 min read
-
Privacy & Compliance
Mar 29, 2020
How Varonis Helps With ITAR Compliance
International Traffic in Arms Regulations (ITAR) mandates that access to physical materials or technical data related to defense and military technologies is restricted to US citizens only.
Jesse Rosenbaum
2 min read
-
Data Security
Mar 29, 2020
3 Tips to Monitor and Secure Exchange Online
Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever.
Michael Buckbee
1 min read
-
Data Security Security Bulletins
Mar 29, 2020
Announcing Varonis Edge – to the Perimeter and Beyond
Email, web, and brute force attacks are the primary ways that malware gets through your defenses. The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails. Remote Access Trojans? DNS.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
How Varonis Levels Up Your Incident Response
It’s a good time to be in cybersecurity. Incident Response(IR) teams are growing like crazy, and there are more jobs in cybersecurity than qualified candidates.
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital