-
Data Security
Mar 29, 2020
Are These 10 Cybersecurity Myths Putting Your Business at Risk?
Cybersecurity preparedness is one of the major obstacles facing businesses today. Despite the increased focus on making companies cybersafe, there are several common cybersecurity misconceptions that still pervade the business world.
Rob Sobers
4 min read
-
Data Security
Mar 29, 2020
Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors
Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
What is a DDoS Attack? Identifying Denial-of-Service Attacks
A Distributed Denial of Service (DDoS) attack is an attempt to crash a web server or online system by overwhelming it with data. DDoS attacks can be simple mischief, revenge, or hacktivism, and can range from a minor annoyance to long-term downtime resulting in loss of business.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Varonis Gets Lightning Fast with Solr
Any security practitioner that has had to perform forensic analysis on a cybersecurity incident likely describes the process as “searching for a needle in a stack of needles.” Even Tony Stark’s magnet isn’t going to help. Anyone who has used a SIEM or any other monitoring system to figure out how gigabytes of data was stolen knows how difficult that task can be.
Michael Buckbee
2 min read
-
Security Bulletins
Mar 29, 2020
64% of Americans Don’t Know What to Do After a Data Breach — Do You? (Survey)
America’s literacy rate is 86% (which is not the best), but the data breach literacy is even worse. The majority of Americans don’t know what to do if they are affected by a breach. Even worse, most have never checked to see if their data was compromised during one of the many major data breaches in recent years.
Rob Sobers
5 min read
-
Data Security
Mar 29, 2020
Browsing Anonymously: Is It Really Anonymous?
Privacy is top of mind for many people these days. Unclear privacy policies, rampant data collection and high-profile data breaches can lead us to second guess our information’s safety — even when it’s guarded by respected institutions. In fact, Americans reportedly trust credit card companies more than the federal government to protect their personal information. To combat this uncertainty, security experts commonly recommend using virtual private networks (VPNs) and secure browsers to keep your browsing history and personal information off the grid. The reality, however, is that these solutions can’t completely keep your activity private and safe.
Michael Buckbee
5 min read
-
Active Directory
Mar 29, 2020
Active Directory Migration Tool (ADMT): Your Essential Guide
There are days where you need to move objects in a domain or forest to somewhere else, and those days require the Active Directory Migration Tool (ADMT). Hopefully, any moves that you make are pre-planned and approved by change management. In reality, sometimes sysadmins have to make emergency Active Directory (AD) migrations for catastrophic hardware failures or as a part of an Incident Response plan. It’s best to know how to use ADMT before you need to make changes, so read on for all of the details.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
How to Turn Cybersecurity Jargon into a Language Everyone in Your Office Can Speak
Explaining how cybersecurity affects an entire organization can be complex. The field is filled with jargon and buzzwords that can hinder understanding for those outside of IT. What’s more, everyone in an organization views cybersecurity through a different lens, depending on what their role in the company is.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers
While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi devices, it’s hard for users to know which habits may be putting them most at risk.
Kody Kinzie
10 min read
-
Data Security
Mar 29, 2020
Security Risk Analysis Is Different From Risk Assessment
At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors. Some of our favorite examples of cyber risk factors are sensitive data that has global access, stale data that’s no longer needed, and overly generous file permission.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
58% of organizations have more than 100,000 folders open to all employees
Like a wardrobe malfunction during a live broadcast, no one wants to be overexposed – especially when it comes to your data.
Rachel Hunt
1 min read
-
Data Security
Mar 29, 2020
Analyzing Company Reputation After a Data Breach
The period following a data breach is not an easy one for companies. Lots of time and money are spent to effectively manage a crisis, with even more time and money spent on the aftermath. These expenses include members of the IT and security teams upgrading their security solutions; management and HR conducting security training for employees; and the crisis communications team talking to customers, stakeholders, and the general public to earn back trust. The way a company manages a data breach directly impacts its reputation after the dust settles.
Michael Buckbee
9 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital