-
Data Security
Jul 15, 2016
Layered Security - IOSS 14
Leave a review for our podcast & we'll send you a pack of infosec cards. Get the Free Pen Testing Active Directory Environments EBook “This really opened my eyes to AD security in a way defensive work never did.”
Michael Buckbee
17 min read
-
Active Directory
Jul 13, 2016
The Difference Between Active Directory and LDAP
Any hacker knows the keys to the network are in Active Directory (AD). Once a hacker has access to one of your user accounts, it’s a race against you and your data security protections to see if you can stop them before they can start a data breach.
Rob Sobers
3 min read
-
Privacy & Compliance
Jul 07, 2016
EU GDPR: Data Rights and Security Obligations [INFOGRAPHIC]
The EU General Data Protection Regulation (GDPR) isn’t light reading (though we’ve done our best with the Plain English Guide to the GDPR. However, it doesn’t mean that this law’s essential ideas can’t be compressed and rendered into a highly informative infographic.
Michael Buckbee
1 min read
-
Data Security
Jul 01, 2016
The Essential Guide to Identifying Your Organization’s Most Sensitive Content
What do hackers want? If you answered money — always a safe bet — then you’d be right. According to the Verizon Data Breach Investigations Report (DBIR), financial gain still is the motivation for over 75% of incidents it had investigated.
Michael Buckbee
6 min read
-
Privacy & Compliance
Jun 24, 2016
GDPR: Pseudonymization as an Alternative to Encryption
Have I mentioned lately that the General Data Protection Regulation (GDPR) is a complicated law? Sure, there are some underlying principles, such as Privacy by Design (PbD) and other ideas, that once you understand, the whole thing makes more sense. But there are plenty of surprises when you delve into the legalese. For example, pseudonymization.
Michael Buckbee
3 min read
-
Data Security
Jun 20, 2016
What is The Cyber Kill Chain and How to Use it Effectively
The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).
Michael Buckbee
4 min read
-
Data Security
Jun 07, 2016
Password Security Tips for Very Busy People
If you needed another reminder that you shouldn’t use the same password on multiple online sites, yesterday’s news about the hacking of Mark Zuckerberg’s Twitter and Pinterest accounts is your teachable moment. Mr. Z. was apparently as guilty as the rest of us in password laxness.
Michael Buckbee
4 min read
-
Data Security
May 23, 2016
How has Ransomware Impacted the US Government?
Ransomware crimes have been soaring this year. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state and local governments, law enforcement agencies and even schools.
Michael Buckbee
3 min read
-
Data Security
May 16, 2016
Ransomware That Deletes Your Files
Organizations with legal obligations to prevent data from improper alteration or destruction—I’m talking to you healthcare orgs that fall under HIPAA– really need to pay close attention to a new ransomware variant.
Michael Buckbee
1 min read
-
Data Security
May 06, 2016
CyptMix Ransomware Claims to Donate Your Ransom Payment to Charity
Unlike traditional ransomware notes that rely on fear-based tactics, a new ransomware strain called CyptMix preys on your generosity.
Michael Buckbee
1 min read
-
Data Security
May 05, 2016
Lessons From the Goldcorp Extortion
Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks:
Michael Buckbee
1 min read
-
Data Security
May 03, 2016
Interesting Deloitte Research on Insider Threats
We’re excited that Deloitte, the international auditing and consulting firm, has been raising the alarms on insider threats. They have some content in the CIO section of the Wall Street Journal that’s worth your time.
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital