Blog

Data Security

Best Practices for SharePoint Permissioning

Jonathan Pistilli

Jonathan Pistilli

SharePoint is Microsoft’s enterprise-class environment for sharing content: documents, presentations, spreadsheets, notes, images, and more. While SharePoint has many advantages over a raw file system in terms of content management,...

Automating Permissions Cleanup: An In-Depth ROI Analysis

Michael Buckbee

Michael Buckbee

Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...

How Major Companies Find Leaks

Rob Sobers

Rob Sobers

Learn how major companies like Google and Facebook detect leaks and see what techniques you can use to protect your company from attacks.

Brute Force: Anatomy of an Attack

Ofer Shezaf

Ofer Shezaf

The media coverage of NotPetya has hidden what might have been a more significant attack: a brute force attack on the UK Parliament.  While for many it was simply fertile...

Koadic: Pen Testing, Pivoting, & JavaScripting, Part II

Michael Buckbee

Michael Buckbee

Mshta and rundll32, the Windows binaries that Koadic leverages, have been long known to hackers. If you take a peek at Mitre’s ATT&CK database, you’ll see that rundll32 has been...

Active Directory Domain Services (AD DS): Overview and Functions

Michael Buckbee

Michael Buckbee

Active Directory Domain Services (AD DS) are the core functions that make AD work. Learn more about AD DS and how to defend AD against cyber attacks.

The Future of Cybersecurity Budgeting

Michael Buckbee

Michael Buckbee

How has spending on cybersecuirty changed over the years? See what companies are prioritizing in their budgets and our tips for managing your own budget.

What is Security Analytics? Guide for the Non-Analytical

Michael Buckbee

Michael Buckbee

Security analytics is the practice of analyzing raw security data to discover preemptive and actionable security measures to increase cybersecurity. It’s not necessarily a particular technique, but certainly involves aggregating...

The Difference between a Computer Virus and Computer Worm

Michael Buckbee

Michael Buckbee

Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a...

Do Executives and Cybersecurity Pros Agree on Today’s Biggest Cyber Threats?

Rachel Hunt

Rachel Hunt

Breaches cost companies billions, erode trust and can have a long-lasting negative impact on a company’s brand. With so much as stake, we wondered: are C-Suite executives aligned with their...

What is SAML and How Does it Work?

Michael Buckbee

Michael Buckbee

Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). In this article we will discuss what SAML is, what it is used for and how it works.

How Honeypots Unmask Hackers & Scammers Online

Kody Kinzie

Kody Kinzie

How defenders use honeypots to unmask hackers, scammers, and internet catfish with tracking links

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.