Data Security
Practical PowerShell for IT Security, Part III: Classification on a Budget
Apr 05, 2017
Last time, with a few lines of PowerShell code, I launched an entire new software category, File Access Analytics (FAA). My 15-minutes of fame is almost over, but I was...
Practical PowerShell for IT Security, Part I: File Event Monitoring
Mar 08, 2017
Back when I was writing the ultimate penetration testing series to help humankind deal with hackers, I came across some interesting PowerShell cmdlets and techniques. I made the remarkable discovery...
Cloudbleed - Cloudflare Unauthorized Data Leak
Feb 24, 2017
Cloudflare is a huge internet infrastructure company (5.5 million websites), which means that you likely use them every day that you’re online, without ever realizing it. Depending on what metric...
Connecting Your Data Strategy to Analytics: Eight Questions to Ask
Jan 20, 2017
Big data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science...
How to setup a SPF record to prevent spam and spear phishing
Jan 12, 2017
Some things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid. When other things are combined...
I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work
Dec 22, 2016
Alan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers....
Ransomware: Legal Cheat Sheet for Breach Notification
Dec 21, 2016
You respond to a ransomware attack in many of the same ways you would to any other cyber attack. In short: have plans in place to analyze the malware, contain...
New Mirai Attacks, But It’s Still About Passwords
Dec 08, 2016
Last week, Mirai-like wormware made the news again with attacks on ISPs in the UK. Specifically, customers of TalkTalk and PostOffice reported Internet outages. As with the last Mirai incident...
PowerView Pen Testing
Nov 30, 2016
Pen Testing Active Directory Environments, PowerView, and how to go on the offensive with AD, take a look at our guide!
Why UBA Will Catch the Zero-Day Ransomware Attacks (That Endpoint Protection Can’t)
Nov 29, 2016
Ransomware attacks have become a major security threat. It feels like each week a new variant is announced –Ransom32, 7ev3n. This malware may even be involved in the next big...
Understanding SQL Injection, Identification and Prevention
Nov 21, 2016
When you think of a website getting hacked, you might picture someone in a hoodie in a high tech bunker (or their mom’s basement), wailing on a keyboard, controlling thousands...
Overheard: "IT security has nothing to learn from the Mirai attack”
Nov 01, 2016
After my post last week on the great Mirai Internet takedown of 2016, I received some email in response. One of the themes in the feedback was, roughly, that ‘Mirai...
Try Varonis free.
Deploys in minutes.