-
Data Security
Mar 29, 2020
10 Secure File Sharing Options, Tips and Solutions
It’s astounding to think about how much digital data is transmitted over the internet on a daily, hourly, or even minutely basis. Every time a web page is loaded or a file is downloaded, a back and forth transaction occurs. Yet sometimes it can still feel like a challenge to find a product or tool that is capable of handling file sharing on a regular basis.
Michael Buckbee
8 min read
-
Data Security
Mar 29, 2020
5 Cybersecurity Concerns of Industry Insiders
We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current issues and concerns on everything from GDPR and the Facebook data scandal to cloud security. Read on to discover what we found after surveying folks who live and breathe security every day.
Rachel Hunt
3 min read
-
Data Security
Mar 29, 2020
Zero-Day Vulnerability Explained
A zero-day vulnerability is a software bug or exploit that hasn’t been patched. It’s like a hole in the bottom of your shoe that you haven’t noticed yet, but a curly-mustachioed villain has found it and is considering putting rusty nails on your gas pedal. Hackers can use these bugs and exploits to steal your data before you’re able to find and patch the weakness.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation
Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts.
Michael Buckbee
1 min read
-
Privacy & Compliance
Mar 29, 2020
Beyond Privacy and DSARs: Public Data Requests (FOI) Are the Law in 50 States
Happy 2020! The New Year brings Californians under the California Consumer Privacy Act (CCPA). CA consumers can ask state-based companies for all relevant data, and to request that companies delete their data. Not in compliance with CCPA? Don’t panic yet. California will not be enforcing the law for another six months. If you’re looking for solutions, we can help out.
Michael Buckbee
4 min read
-
Privacy & Compliance
Mar 29, 2020
What the H**L Does Reasonable Data Security Really Mean?
For anyone who’s spent time looking at data security laws and regulations, you can’t help but come across the words “reasonable security”, or its close cousin “appropriate security”. You can find this legal verbiage in state breach notification laws, in HIPAA’s Security Rule (“reasonable and appropriate” security), in FERPA, and many other federal data security laws and guidances. So what does it mean?
Michael Buckbee
3 min read
-
Privacy & Compliance
Mar 29, 2020
Post-Davos Thoughts on the EU NIS Directive
I’ve been meaning to read the 80-page report published by the World Economic Forum (WEF) on the global risks humankind now faces. They’re the same folks who bring you the once a year gathering of the world’s bankers and other lesser humanoids held at a popular Swiss ski resort. I was told there was an interesting section on … data security.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Spotlighting Unstructured Data Access
At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T, and now current Founder and Chief Executive Officer of TAG Cyber, recently penned an independent article on our platform after two technical sessions with our team.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
What Working in Cybersecurity is Really Like: A Day in the Life
There are a lot of reasons to pursue a career in cybersecurity. Across the board, cybersecurity roles offer competitive pay, growth opportunity, job security, exciting day-to-day tasks and the chance to make a difference. Cybersecurity careers don’t only consist of white hat hacking, there is a huge variety of different avenues that are fit for different personality types.
Rob Sobers
18 min read
-
Active Directory
Mar 29, 2020
Active Directory Domain Controller (AD DC) Could Not Be Contacted [SOLVED]
When your users report that they see “an active directory domain controller for the domain could not be contacted” there could be a few different causes for this issue. Most likely, there aren’t any shenanigans happening, which makes this blog different from my usual writing. Users that can’t contact the Domain Controller are most likely having network or hardware issues. A good hacker wouldn’t want to call that kind of attention to their activity – unless they want to try to steal an administrator login ticket… anyway, this is most likely an easy fix.
Michael Buckbee
2 min read
-
Data Security
Mar 29, 2020
What Certifications Should I Get for IT?
The cybersecurity market is one of the best fields for job seekers to be in right now. It is projected to reach $248.26 billion in 2023. This is a 64% increase from its valuation in 2013. Cyberseek reports that there are more than 300,000 cybersecurity job openings in the US and that there are only 2.3 existing cybersecurity workers for every job opening. This means that demand is high for these positions and job security is strong.
Rob Sobers
2 min read
-
Data Security
Mar 29, 2020
Maximize your ROI: Maintaining a Least Privilege Model
TL;DR: Managing permissions can be expensive. For a 1,000 employee company, the overhead of permissions request tickets can cost up to $180K/year. Automating access control with DataPrivilege can save $105K/year or more and reduce risk. Read on to see the math.
Michael Buckbee
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital