-
Data Security
Sep 30, 2019
A Practical Software Approach to Insider Threats
Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But there is a way out of the insider nightmare scenario.
Michael Buckbee
5 min read
-
Data Security
Jul 09, 2019
Adventures in Fileless Malware, Part IV: DDE and Word Fields
This article is part of the series "Fileless Malware". Check out the rest: Adventures in Fileless Malware, Part I Adventures in Fileless Malware, Part II: Sneaky VBA Scripts Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit Adventures in Fileless Malware, Part IV: DDE and Word Fields Adventures in Fileless Malware, Part V: More DDE and COM Scriplets Adventures in Fileless Malware: Closing Thoughts
Michael Buckbee
4 min read
-
Data Security
Jun 20, 2019
Working With Windows Local Administrator Accounts, Part III
This article is part of the series "Working With Windows Local Administrator Accounts". Check out the rest: Part I Part II Part III
Michael Buckbee
2 min read
-
Data Security
Nov 05, 2018
California Consumer Privacy Act (CCPA) vs. GDPR
Data privacy laws are fast becoming a primary element in any data security conversation: from the EU’s GDPR to the California Consumer Privacy Act to Japan’s Act on the Protection of Personal Information, the ability to protect consumer data is top of mind. For companies that are built around consumer data, consumer trust becomes a vital part of their business model.
Michael Buckbee
5 min read
-
Data Security
Oct 10, 2018
What is ITAR Compliance? Definition and Regulations
The International Traffic in Arms Regulations (ITAR) is the United States regulation that controls the manufacture, sale, and distribution of defense and space-related articles and services as defined in the United States Munitions List (USML).
Michael Buckbee
4 min read
-
Data Security
Oct 05, 2018
Master Fileless Malware Penetration Testing!
This article is part of the series "Living off the Land With Microsoft". Check out the rest: Master Fileless Malware Penetration Testing! The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32 The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32 The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
Michael Buckbee
1 min read
-
Data Security Security Bulletins
Sep 04, 2018
The Top Skills of Fortune 100 CISOs
The role of CISO is constantly expanding and evolving with the growing awareness of cyber attacks. As cyber attacks increase in density and sophistication, organizations are beginning to look at security as a business priority and the role of CISO has become more critical.
Rob Sobers
1 min read
-
Data Security
Aug 31, 2018
What is the Colorado Privacy Law?
On September 1, 2018, the Colorado Protections for Consumer Data Privacy law, HB 18-1128, goes into effect. A bi-partisan group introduced HB 18-1128 in January, and after the usual negotiations, the Legislature passed it unanimously. The new Privacy Law provisions are part of the Colorado Consumer Protection Act (“CCPA”), in a continued effort to protect personal data.
Michael Buckbee
2 min read
-
Data Security
Jul 19, 2018
The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
This article is part of the series "Living off the Land With Microsoft". Check out the rest: Master Fileless Malware Penetration Testing! The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32 The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32 The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
Michael Buckbee
3 min read
-
Data Security
Jul 02, 2018
The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32
This article is part of the series "Living off the Land With Microsoft". Check out the rest: Master Fileless Malware Penetration Testing! The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32 The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32 The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
Michael Buckbee
4 min read
-
Privacy & Compliance
Jun 25, 2018
How Privacy Policies Have Changed Since GDPR
On May 25th, 2018 the European Union’s General Data Protection Regulation, better known as GDPR, became an enforceable law. The policy was implemented primarily to create greater transparency regarding how companies handle personal data, and to enforce stricter requirements around the use and sharing of that personal data.
Rob Sobers
6 min read
-
Data Security
Jun 14, 2018
The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams
This article is part of the series "Living off the Land With Microsoft". Check out the rest: Master Fileless Malware Penetration Testing! The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32 The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32 The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital