-
Active Directory
Jan 17, 2017
Pen Testing Active Directory Environments, Part V: Admins and Graphs
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
6 min read
-
Data Security
Jan 12, 2017
How to setup a SPF record to prevent spam and spear phishing
Some things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid.
Michael Buckbee
6 min read
-
Privacy & Compliance
Jan 11, 2017
GDPR: Do You Have to Hire a DPO?
I suspect right about now that EU (and US) companies affected by the General Data Protection Regulation (GDPR) are starting to look more closely at their compliance project schedules. With enforcement set to begin in May 2018, the GDPR-era will shortly be upon us.
Michael Buckbee
3 min read
-
Active Directory
Jan 04, 2017
Pen Testing Active Directory Environments, Part IV: Graph Fun
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
4 min read
-
Data Security
Dec 22, 2016
I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work
Alan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers. Alan helps them realize the value we can provide within their environment and maintain these relationships as they become customers.
Michael Buckbee
4 min read
-
Data Security
Dec 21, 2016
Ransomware: Legal Cheat Sheet for Breach Notification
You respond to a ransomware attack in many of the same ways you would to any other cyber attack. In short: have plans in place to analyze the malware, contain the damage, restore operations if need be, and notify any regulatory or enforcement authorities.
Michael Buckbee
3 min read
-
Active Directory
Dec 16, 2016
Pen Testing Active Directory Environments, Part III: Chasing Power Users
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
5 min read
-
Data Security
Dec 08, 2016
New Mirai Attacks, But It’s Still About Passwords
Last week, Mirai-like wormware made the news again with attacks on ISPs in the UK. Specifically, customers of TalkTalk and PostOffice reported Internet outages. As with the last Mirai incident involving consumer cameras, this one also took advantage of an exposed router port.
Michael Buckbee
3 min read
-
Data Security
Nov 30, 2016
PowerView Pen Testing
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
4 min read
-
Data Security
Nov 29, 2016
Why UBA Will Catch the Zero-Day Ransomware Attacks (That Endpoint Protection Can’t)
Ransomware attacks have become a major security threat. It feels like each week a new variant is announced –Ransom32, 7ev3n. This malware may even be involved in the next big breach. New variants such as Chimera threaten to not just ransom your data, but also leak it online if you don’t pay up.
Kieran Laffan
2 min read
-
Data Security
Nov 21, 2016
Understanding SQL Injection, Identification and Prevention
A Word of Caution When you think of a website getting hacked, you might picture someone in a hoodie in a high tech bunker (or their mom’s basement), wailing on a keyboard, controlling thousands of remote machines in coordinated attacks, while output that looks like http://hackertyper.com/ scrolls past in a blur.
Michael Buckbee
12 min read
-
Active Directory
Nov 10, 2016
Pen Testing Active Directory Environments, Part I: Introduction to crackmapexec (and PowerView)
This article is part of the series "Pen Testing Active Directory Environments". Check out the rest: Binge Read Our Pen Testing Active Directory Series Part I: Introduction to crackmapexec (and PowerView) PowerView Pen Testing: PowerShell Probing of Active Directory Part III: Chasing Power Users Part IV: Graph Fun Part V: Admins and Graphs Part VI: The Final Case
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital