-
Data Security
Mar 29, 2020
Kerberos Attack: Silver Ticket Edition
With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty and invasive, and even stealthier.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
DHS Emergency Directive 19-01: How to Detect DNS Attacks
On January 22, 2019, the United State Department of Homeland Security (DHS) released a warning for a DNS infrastructure hijacking attack against US government agencies.
David Gibson
3 min read
-
Data Security
Mar 29, 2020
12 TED Talks That Will Change the Way You Look at Business Cybersecurity
The cybersecurity landscape is constantly evolving. New security threats pop up daily, and threat actors can be an employee in the next cubicle or a blackhat hacker in a coffee shop in Bangkok.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
8 Events That Changed Cybersecurity Forever
“Those who cannot remember the past are condemned to repeat it.” – George Santayana
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!
Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the Ponemon analysis to learn about last year’s average incident costs, average per record costs, and detailed industry breakdowns? You can find all this in the current report. But then Ponemon did something astonishing.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
Artificial Intelligence vs. Machine Learning in Cybersecurity
What’s the first thing you think of when you hear “artificial intelligence,” “machine learning” or “deep learning”? If you’re thinking about sentient robots that overtake cities or super cyborgs that surpass human intelligence, you may have a few misconceptions about what artificial intelligence (AI), machine learning (ML) and deep learning (DL) are and how they’re used.
Rob Sobers
8 min read
-
Privacy & Compliance
Mar 29, 2020
What is FISMA Compliance? Regulations and Requirements
FISMA stands for the Federal Information Security Management Act, which the United States Congress passed in 2002: it requires federal agencies to implement information security plans to protect sensitive data.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks
Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results — where the credit cards numbers are stored, the access rights for the folder, the results of phishing tests, the threat environment — into a risk model that produces a measurement. It’s this risk measurement, say VaR or average loss over a period, which upper-level management is really focused on.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
Kerberos Authentication Explained
According to myth, Kerberos (you might know him as Cerberus) guards the Gates to the Underworld. He’s a big 3 headed dog with a snake for a tail and a really bad temper.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
9 Infamous APT Groups: Fast Fact Trading Cards
Advanced Persistent Threat (APT) groups are widely classified as organizations that lead, “attacks on a country’s information assets of national security or strategic economic importance through either cyberespionage or cybersabotage.” They are elusive, eminent and effective at what they do: wreaking havoc on their targets.
Rob Sobers
4 min read
-
Data Security
Mar 29, 2020
The Difference Between E3 and E5 Office365 Features
Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and Office 365 products.
Michael Buckbee
3 min read
-
PowerShell
Mar 29, 2020
PowerShell Array Guide: How to Use and Create
Arrays are a fundamental feature of PowerShell. Arrays make it possible to ingest, manipulate and output true data structures (and not just raw strings). This capability makes PowerShell different and more useful than other scripting languages.
Michael Buckbee
10 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital