-
Data Security
Apr 05, 2017
Practical PowerShell for IT Security, Part III: Classification on a Budget
This article is part of the series "Practical PowerShell for IT Security". Check out the rest: Part I: File Event Monitoring Part II: File Access Analytics (FAA) Part III: Classification on a Budget Part IV: Security Scripting Platform (SSP) Part V: Security Scripting Platform Gets a Makeover
Michael Buckbee
8 min read
-
Privacy & Compliance
Apr 03, 2017
Data Security Compliance and DatAdvantage, Part I: Essential Reports for Risk Assessment
This article is part of the series "Data Security Compliance and DatAdvantage". Check out the rest: Part I: Essential Reports for Risk Assessment Part II: More on Risk Assessment Part III: Protect and Monitor
Michael Buckbee
4 min read
-
PowerShell
Mar 22, 2017
Practical PowerShell for IT Security, Part II: File Access Analytics (FAA)
This article is part of the series "Practical PowerShell for IT Security". Check out the rest: Part I: File Event Monitoring Part II: File Access Analytics (FAA) Part III: Classification on a Budget Part IV: Security Scripting Platform (SSP) Part V: Security Scripting Platform Gets a Makeover
Michael Buckbee
7 min read
-
Privacy & Compliance
Mar 20, 2017
Cybercrime Laws Get Serious: Canada’s PIPEDA and CCIRC
In this series on governmental responses to cybercrime, we’re taking a look at how countries through their laws are dealing with broad attacks against IT infrastructure beyond just data theft. Ransomware and DDoS are prime examples of threats that don’t necessarily fit into the narrower definition of breaches found in PII-focused data security laws. That’s where special cybercrime rules come into play.
Michael Buckbee
1 min read
-
Active Directory
Mar 16, 2017
Varonis eBook: Pen Testing Active Directory Environments
You may have been following our series of posts on pen testing Active Directory environments and learned about the awesome powers of PowerView. No doubt you were wowed by our cliffhanger ending — spoiler alert — where we applied graph theory to find the derivative admin!
Michael Buckbee
1 min read
-
Data Security
Mar 08, 2017
Practical PowerShell for IT Security, Part I: File Event Monitoring
This article is part of the series "Practical PowerShell for IT Security". Check out the rest: Part I: File Event Monitoring Part II: File Access Analytics (FAA) Part III: Classification on a Budget Part IV: Security Scripting Platform (SSP) Part V: Security Scripting Platform Gets a Makeover
Michael Buckbee
5 min read
-
Data Security
Feb 24, 2017
Cloudbleed - Cloudflare Unauthorized Data Leak
Cloudflare is a huge internet infrastructure company (5.5 million websites), which means that you likely use them every day that you’re online, without ever realizing it. Depending on what metric you use, as much as 25% of the Alexa Top 10000 sites is using Cloudflare for some part of their public facing infrastructure.
Michael Buckbee
2 min read
-
Privacy & Compliance
Feb 21, 2017
Cybersecurity Laws Get Serious: EU’s NIS Directive
In the IOS blog, our cyberattack focus has mostly been on hackers stealing PII and other sensitive personal data. The breach notification laws and regulations that we write about require notification only when there’s been acquisition or disclosure of PII by an unauthorized user. In plain speak, the data is stolen.
Michael Buckbee
4 min read
-
Security Bulletins
Feb 13, 2017
Introducing a new security dashboard, enhanced behavioral analysis, and more
Every day we hear new stories about how our customers are using DatAlert to stop cyberattacks: detecting and disabling ransomware infections, discovering misconfigurations and vulnerabilities, and setting up automatic responses to malware infections.
Michael Buckbee
1 min read
-
Active Directory
Feb 08, 2017
Binge Read Our Pen Testing Active Directory Series
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
1 min read
-
Active Directory
Jan 27, 2017
Pen Testing Active Directory Environments, Part VI: The Final Case
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
5 min read
-
Data Security
Jan 20, 2017
Connecting Your Data Strategy to Analytics: Eight Questions to Ask
Big data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science to drive the bottom line. According to a recent executive survey, 54% of firms surveyed now report having appointed a CDO.
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital