Blog

Data Security

Overheard: "IT security has nothing to learn from the Mirai attack”

Michael Buckbee

Michael Buckbee

After my post last week on the great Mirai Internet takedown of 2016, I received some email in response. One of the themes in the feedback was, roughly, that ‘Mirai...

The Mirai Botnet Attack and Revenge of the Internet of Things

Michael Buckbee

Michael Buckbee

Once upon a time in early 2016, we were talking with pen tester Ken Munro about the security of IoT gadgetry — everything from wireless doorbells to coffee makers and...

NTFS Permissions vs Share: Everything You Need to Know

Michael Buckbee

Michael Buckbee

NTFS permissions are used to manage access to the files and folders that are stored in NTFS file systems. When you are using share and NTFS (NT File System) permissions together, the most restrictive permission wins.

SQL Server Best Practices, Part II: Virtualized Environments

Kieran Laffan

Kieran Laffan

It is 2016 and some people still think SQL Server cannot be run on a virtual machine. SQL Server can successfully run in a VM but SQL is resource-intensive by...

What is Privileged Access Management (PAM)?

Michael Buckbee

Michael Buckbee

Privileged access management is the process to monitor and secure your most sensitive user accounts. Keep reading to find out how to use PAM to keep your data safe.

When a Cyber Attack Is a Political Weapon

Michael Buckbee

Michael Buckbee

We’re not surprised when hackers attack companies to scoop up credit card numbers or to cause IT disruption. If they’re state sponsored, they may target organizations to pull out intellectual...

How to setup your DNS Server like North Korea

Michael Buckbee

Michael Buckbee

I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your shoulder, touches...

The Difference Between SSL and TLS

Michael Buckbee

Michael Buckbee

SSL and TLS are used interchangably in conversations as they are incredibly closely related. Knowing the subtle difference is key. 

The Vulnerability of Things - IOSS 21

Michael Buckbee

Michael Buckbee

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...

Malware Coding Lessons for IT People, Part II: Fun With FUD Ransomware!

Oded Awaskar

Oded Awaskar

Let’s not overthink ransomware! It’s just a small malicious piece of code with one devious goal — encrypting all of the user’s important files. It the unfortunate victim wants to...

New SamSam Ransomware Exploiting Old JBoss Vulnerability

Michael Buckbee

Michael Buckbee

One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware...

Six Authentication Experts You Should Follow

Michael Buckbee

Michael Buckbee

Our recent ebook shows what’s wrong with current password-based authentication technology. But luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.