Blog

Data Security

Lessons From the Goldcorp Extortion

Michael Buckbee

Michael Buckbee

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks: Attackers appear to have...

Interesting Deloitte Research on Insider Threats

Michael Buckbee

Michael Buckbee

We’re excited that Deloitte, the international auditing and consulting firm, has been raising the alarms on insider threats. They have some content in the CIO section of the Wall Street...

Visualize your risk with the DatAlert dashboard

Michael Buckbee

Michael Buckbee

Last week, we introduced over 20 new threat models to help defend your data against insider threats, ransomware attacks and threats to your most sensitive data. But with all this...

Football player hacked live during NFL draft

Rob Sobers

Rob Sobers

Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from...

Cryptolocker, lockouts and mass deletes, oh my!

Michael Buckbee

Michael Buckbee

DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your...

New Varonis eBook Helps IT Kickstart Their Pen Testing Program

Michael Buckbee

Michael Buckbee

Hackers are able to break into systems and move around easily without being detected. How is this possible with so much invested in firewalls, malware scanners, and other intrusion detection...

CEO Phishing: Hackers Target High-Value Data

Michael Buckbee

Michael Buckbee

Humans like to click on links. Some of us are better at resisting the urge, some worse. In any case, you’d also expect that people in the higher reaches of...

Ransomware Guide for Healthcare Providers

Michael Buckbee

Michael Buckbee

Table of Contents Ransomware strains that have been targeting hospitals Should your hospital pay? Reasons not to pay Would a ransomware infection be considered a breach, according to HIPAA? Are...

Learning to Write Fully Undetected Malware - Lessons For IT

Oded Awaskar

Oded Awaskar

 I really believe that an IT security person should master some of the programming concepts that go into malware. File that under “know your enemy”.

PwC Report Shows That Cybercrime Is a Top C-Level Concern

Michael Buckbee

Michael Buckbee

One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of...

4 Step Guide to Managing Network Share Permissions

David Gibson

David Gibson

Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics...

There’s Something About Frameworks: A Look at HITRUST’s CSF

Michael Buckbee

Michael Buckbee

Repeat after me: frameworks are not standards. They are instead often used as a guide to navigate through the underlying standards. There are lots of frameworks cropping up in the...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.