- 
						
							 Data Security Data SecurityMay 20, 2017 EternalRocks leaves backdoor trojan for remote access to infected machinesWhat we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1...   Kieran Laffan 2 min read 
- 
						
							 Data Security Data SecurityMay 15, 2017 Why did last Friday's ransomware infection spread globally so fast?Ransomware is a type of malware that encrypts your data and asks for you to pay a ransom to restore access to your files. Cyber criminals usually request that the...   Kieran Laffan 3 min read 
- 
						
							 Data Security Data SecurityMay 12, 2017 🚨 Massive Ransomware Outbreak: What You Need To KnowRemember those NSA exploits that got leaked a few months back? A new variant of ransomware using those exploits is spreading quickly across the world – affecting everyone from the...   Michael Buckbee 2 min read 
- 
						
							 Data Security Data SecurityMay 12, 2017 Planet RansomwareIf you were expecting a quiet Friday in terms of cyberattacks, this ain’t it. There are reports of a massive ransomware attack affecting computers on a global scale: in the...   Michael Buckbee 1 min read 
- 
						
							 Data Security Data SecurityApr 12, 2017 What is a Data Security Portfolio?A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools to reduce risk and prevent threats.   Rob Sobers 6 min read 
- 
						
							 Data Security Data SecurityMar 08, 2017 Practical PowerShell for IT Security, Part I: File Event MonitoringBack when I was writing the ultimate penetration testing series to help humankind deal with hackers, I came across some interesting PowerShell cmdlets and techniques. I made the remarkable discovery...   Michael Buckbee 5 min read 
- 
						
							 Data Security Data SecurityJan 20, 2017 Connecting Your Data Strategy to Analytics: Eight Questions to AskBig data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science...   Michael Buckbee 3 min read 
- 
						
							 Data Security Data SecurityJan 12, 2017 How to setup a SPF record to prevent spam and spear phishingSome things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid. When other things are combined...   Michael Buckbee 6 min read 
- 
						
							 Data Security Data SecurityDec 22, 2016 I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I WorkAlan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers....   Michael Buckbee 4 min read 
- 
						
							 Data Security Data SecurityDec 21, 2016 Ransomware: Legal Cheat Sheet for Breach NotificationYou respond to a ransomware attack in many of the same ways you would to any other cyber attack. In short: have plans in place to analyze the malware, contain...   Michael Buckbee 3 min read 
- 
						
							 Data Security Data SecurityDec 08, 2016 New Mirai Attacks, But It’s Still About PasswordsLast week, Mirai-like wormware made the news again with attacks on ISPs in the UK. Specifically, customers of TalkTalk and PostOffice reported Internet outages. As with the last Mirai incident...   Michael Buckbee 3 min read 
- 
						
							 Data Security Data SecurityNov 30, 2016 PowerView Pen TestingPen Testing Active Directory Environments, PowerView, and how to go on the offensive with AD, take a look at our guide!   Michael Buckbee 4 min read 
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital