Blog

Data Security

How to setup your DNS Server like North Korea

Michael Buckbee

Michael Buckbee

I can only imagine it’s a high stress job doing IT support for Kim Jong Un as he’s the kind of manager who probably watches you over your shoulder, touches...

The Difference Between SSL and TLS

Michael Buckbee

Michael Buckbee

SSL and TLS are used interchangably in conversations as they are incredibly closely related. Knowing the subtle difference is key. 

The Vulnerability of Things - IOSS 21

Michael Buckbee

Michael Buckbee

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices...

Malware Coding Lessons for IT People, Part II: Fun With FUD Ransomware!

Oded Awaskar

Oded Awaskar

Let’s not overthink ransomware! It’s just a small malicious piece of code with one devious goal — encrypting all of the user’s important files. It the unfortunate victim wants to...

New SamSam Ransomware Exploiting Old JBoss Vulnerability

Michael Buckbee

Michael Buckbee

One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware...

Six Authentication Experts You Should Follow

Michael Buckbee

Michael Buckbee

Our recent ebook shows what’s wrong with current password-based authentication technology. But luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people...

SQL Server Best Practices, Part I: Configuration

Kieran Laffan

Kieran Laffan

Am I the only one who finds the Microsoft SQL server best practice guides to be a little painful to trawl through? Somehow, I doubt it. After being frustrated reading...

21 Free Tools Every SysAdmin Should Know

Rob Sobers

Rob Sobers

Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...

Banks Secretly and Silently Struggling with Ransomware

Michael Buckbee

Michael Buckbee

“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...

How to Identify Ransomware: Use Our New Identification Tool

Michael Buckbee

Michael Buckbee

Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...

How to Respond to a Cyber Security Incident

Michael Buckbee

Michael Buckbee

Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...

Layered Security - IOSS 14

Michael Buckbee

Michael Buckbee

Layered security refers to the practice of combining various security defenses to protect the entire system against threats. The idea is that if one layer fails, there are other functioning...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.