-
Data Security
Jul 15, 2014
Pass the Hash, Part III: How NTLM Will Get You Hacked
This article is part of the series "A Closer Look at Pass the Hash". Check out the rest: Part I Part II: Prevention Part III: How NTLM Will Get You Hacked (and What You Should Do About It)
Michael Buckbee
4 min read
-
Active Directory
Jul 10, 2014
Risks of Renaming Your Domain in Active Directory
As a sysadmin, there might be moments where you’ll find the need to change, merge, or rename your domain. Hopefully you name your domain well the first time, but there are still many reasons why you might need to rename a domain, for instance: an organizational restructuring, merger, buyout or expansion. Keep in mind that a rename is not designed to accommodate forest mergers or the movement of domains between forests.
Michael Buckbee
3 min read
-
Data Security
Jul 08, 2014
3 Deadly File Permissions Mistakes
Scarily, in most organizations people have access to much more information than they need in order to do their jobs. With file permissions, it’s easy to mess things up and hard to find and fix problems, especially in large environments. One tiny mistake can cause a ripple effect across terabytes of data, opening up a massive security hole.
Rob Sobers
2 min read
-
Data Security
Jun 26, 2014
A Closer Look at Pass the Hash, Part II: Prevention
This article is part of the series "A Closer Look at Pass the Hash". Check out the rest: Part I Part II: Prevention Part III: How NTLM Will Get You Hacked (and What You Should Do About It)
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2014
A Closer Look at Pass the Hash, Part I
This article is part of the series "A Closer Look at Pass the Hash". Check out the rest: Part I Part II: Prevention Part III: How NTLM Will Get You Hacked (and What You Should Do About It)
Michael Buckbee
3 min read
-
Data Security
May 21, 2014
What’s the Difference between Hacking and Phishing?
Because I’ve boldly assigned myself the task to explain hacking and phishing, I feel compelled to define both terms concisely because, as Einstein’s been quoted countless times, “If you can’t explain it simply, you don’t understand it well enough.”
Michael Buckbee
2 min read
-
Data Security
Apr 21, 2014
How to Configure Varonis and EMC Isilon
Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc. Varonis is the perfect fit. With our new integration, EMC Isilon customers can audit, manage and protect their human-generated data.
Rob Sobers
1 min read
-
Active Directory
Apr 16, 2014
Best Practices for Naming an Active Directory Domain
When you’re naming domains, it should be planned as carefully as you would in naming your first child – of course I’m exaggerating – but it’s worth planning carefully. For those of you who fail to heed this advice, we’ve written a tutorial on how to rename a domain. 🙂
Michael Buckbee
1 min read
-
Data Security
Mar 11, 2014
5 Privacy Concerns about Wearable Technology
With over 55 different fitness wearable devices to choose from, the wearables market has breathed new life into our personal health, providing us with more insight into our sleep patterns, calories burned, blood pressure, heart rate and so much more. In the near future, we may even ingest sensors to gauge how our body reacts to a drug. Adorning ourselves from head to toe with devices that allow us to quantify our health in new ways could bring enormous health benefits.
Michael Buckbee
3 min read
-
Data Security
Mar 05, 2014
Automate Exchange Distribution List Management
From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating lots of these Active Directory objects in their corporate domains. DLs speed up overall collaboration and leverage the power of groups to answer questions, share and inspire ideas, and announce news. For a number of years, the Linux operating system was developed and maintained by submitting patches via a mailing list.
Michael Buckbee
2 min read
-
Data Security
Feb 14, 2014
CIFS vs SMB: What's the Difference?
I’ve received quite a few questions from both new and experienced sysadmins about networked filesystems and file sharing protocols. One question that comes up frequently is “What is the difference between CIFS and SMB ?”
Rob Sobers
3 min read
-
Data Security
Jan 21, 2014
Cryptography May Not Be Dead, But It Is on Life Support
Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce Schneier discuss the implications of the Snowden documents. But we quickly learned from others sessions that there was an underlying context to this conference. Over the last year, cryptography and data security have been completely shaken by malware, and specifically advanced persistent threats or APTs, leading some to say or at least imply that cryptography is dead.
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital