-
Data Security
Mar 29, 2020
Adventures in Fileless Malware: Closing Thoughts
This article is part of the series "Fileless Malware". Check out the rest: Adventures in Fileless Malware, Part I Adventures in Fileless Malware, Part II: Sneaky VBA Scripts Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit Adventures in Fileless Malware, Part IV: DDE and Word Fields Adventures in Fileless Malware, Part V: More DDE and COM Scriplets Adventures in Fileless Malware: Closing Thoughts
Michael Buckbee
3 min read
-
Security Bulletins
Mar 29, 2020
Varonis Version 7 Highlights
Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new.
Michael Buckbee
1 min read
-
PowerShell
Mar 29, 2020
How To Use PowerShell for Privilege Escalation with Local Computer Accounts
What is Privilege Escalation? Privilege escalation is when an attacker is able to exploit the current rights of an account to gain additional, unexpected access. While this can be caused by zero-day vulnerabilities, state-level actors crafting attacks or cleverly disguised malware most often it’s a result of a simple account misconfiguration.
Michael Buckbee
3 min read
-
Privacy & Compliance
Mar 29, 2020
GDPR: The Right to Be Forgotten and AI
One (of the many) confusing aspects of the EU General Data Protection Regulation (GDPR) is its “right to be forgotten”. It’s related to the right to erasure but takes in far more ground. The right to have your personal deleted means that data held by the data controller must be removed on request by the consumer. The right to be forgotten refers more specifically to personal data the controller has made public on the Intertoobz.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
11 Popular Programming Languages to Open Doors
Learning programming languages can open doors to new opportunities. But with so many languages out there, it’s imperative to pick the appropriate ones to best suit your career, personal goals and interests. Computer programming languages are essential to know if you have an interest in the various careers available in development, programming, ethical hacking, analysis, and engineering, among others like DevOps.
Rob Sobers
8 min read
-
Privacy & Compliance
Mar 29, 2020
NYDFS Cybersecurity Regulation in Plain English
In 2017, the New York State Department of Financial Services (NYDFS) launched GDPR-like cybersecurity regulations for its massive financial industry. Unusual at the state level, this new regulation includes strict requirements for breach reporting and limiting data retention.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
12 Ways Varonis Helps You Manage Mergers and Acquisitions
How Varonis Helps with Mergers and Acquisitions A well-constructed Merger & Acquisition (M&A) playbook reduces the overall time, cost and risk of the upcoming merger and/or acquisition. Gartner advises that organizations who intend to grow through acquisitions involve the CIO and IT teams early in the process by “sharing models with their business executives that raise the right questions and issues to consider.” Further, according to Gartner analysts Cathleen E. Blanton and Lee Weldon, CIOs should “create a reusable IT M&A playbook that can be quickly deployed when an idea or opportunity arises” and to share this data with senior management.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Krack Attack: What You Need to Know
For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access.
Michael Buckbee
2 min read
-
Data Security
Mar 29, 2020
Which Cybersecurity Career Is Right For Me?
New high-profile cyber attacks seem to constantly flood news headlines, so it’s no wonder that cybersecurity experts are becoming such an important and in-demand position for all types of firms.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
The World in Data Breaches
Data security is one of the largest concerns impacting the world today.
Rob Sobers
2 min read
-
Data Security
Mar 29, 2020
CISM vs. CISSP Certification: Which One is Best for You?
It’s a perfect time to be CISM or CISSP certified, or have any cybersecurity certification: according to Gartner, the unemployment rate for cybersecurity professionals is zero – as in there isn’t an unemployment rate. In fact, there are more jobs than qualified candidates, and the job postings stay open for a long time.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Koadic: Implants and Pen Testing Wisdom, Part III
This article is part of the series "Koadic Post-Exploitation Rootkit". Check out the rest: Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I Koadic: Pen Testing, Pivoting, & JavaScripting, Part II Koadic: Implants and Pen Testing Wisdom, Part III Koadic: Security Defense in the Age of LoL Malware, Part IV
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital