-
Data Security
Oct 25, 2016
NTFS Permissions vs Share: Everything You Need to Know
NTFS permissions are used to manage access to the files and folders that are stored in NTFS file systems. When you are using share and NTFS (NT File System) permissions together, the most restrictive permission wins.
Michael Buckbee
3 min read
-
Data Security
Oct 24, 2016
SQL Server Best Practices, Part II: Virtualized Environments
It is 2016 and some people still think SQL Server cannot be run on a virtual machine. SQL Server can successfully run in a VM but SQL is resource-intensive by...
Kieran Laffan
8 min read
-
Data Security
Oct 20, 2016
What is Privileged Access Management (PAM)?
Privileged access management is the process to monitor and secure your most sensitive user accounts. Keep reading to find out how to use PAM to keep your data safe.
Michael Buckbee
5 min read
-
Data Security
Oct 06, 2016
When a Cyber Attack Is a Political Weapon
We’re not surprised when hackers attack companies to scoop up credit card numbers or to cause IT disruption. If they’re state sponsored, they may target organizations to pull out intellectual...
Michael Buckbee
3 min read
-
Data Security
Sep 29, 2016
How to setup your DNS Server like North Korea
I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your shoulder, touches...
Michael Buckbee
2 min read
-
Data Security
Sep 06, 2016
The Vulnerability of Things - IOSS 21
We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...
Michael Buckbee
1 min read
-
Data Security
Aug 31, 2016
Malware Coding Lessons for IT People, Part II: Fun With FUD Ransomware!
Let’s not overthink ransomware! It’s just a small malicious piece of code with one devious goal — encrypting all of the user’s important files. It the unfortunate victim wants to...
Oded Awaskar
4 min read
-
Data Security
Aug 02, 2016
SQL Server Best Practices, Part I: Configuration
Am I the only one who finds the Microsoft SQL server best practice guides to be a little painful to trawl through? Somehow, I doubt it. After being frustrated reading...
Kieran Laffan
7 min read
-
Data Security
Jul 27, 2016
21 Free Tools Every SysAdmin Should Know
Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...
Rob Sobers
4 min read
-
Data Security
Jul 21, 2016
Banks Secretly and Silently Struggling with Ransomware
“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...
Michael Buckbee
2 min read
-
Data Security
Jul 20, 2016
How to Identify Ransomware: Use Our New Identification Tool
Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...
Michael Buckbee
1 min read
-
Data Security
Jul 19, 2016
How to Respond to a Cyber Security Incident
Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital