-
Data Security
Aug 19, 2016
New SamSam Ransomware Exploiting Old JBoss Vulnerability
One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware...
Michael Buckbee
1 min read
-
Data Security
Aug 17, 2016
Six Authentication Experts You Should Follow
Our recent ebook shows what’s wrong with current password-based authentication technology. But luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people...
Michael Buckbee
3 min read
-
Data Security
Aug 02, 2016
SQL Server Best Practices, Part I: Configuration
Am I the only one who finds the Microsoft SQL server best practice guides to be a little painful to trawl through? Somehow, I doubt it. After being frustrated reading...
Kieran Laffan
7 min read
-
Data Security
Jul 27, 2016
21 Free Tools Every SysAdmin Should Know
Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...
Rob Sobers
4 min read
-
Data Security
Jul 21, 2016
Banks Secretly and Silently Struggling with Ransomware
“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...
Michael Buckbee
2 min read
-
Data Security
Jul 20, 2016
How to Identify Ransomware: Use Our New Identification Tool
Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...
Michael Buckbee
1 min read
-
Data Security
Jul 19, 2016
How to Respond to a Cyber Security Incident
Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...
Michael Buckbee
4 min read
-
Data Security
Jul 15, 2016
Layered Security - IOSS 14
Layered security refers to the practice of combining various security defenses to protect the entire system against threats. The idea is that if one layer fails, there are other functioning...
Michael Buckbee
17 min read
-
Data Security
Jul 01, 2016
The Essential Guide to Identifying Your Organization’s Most Sensitive Content
What do hackers want? If you answered money — always a safe bet — then you’d be right. According to the Verizon Data Breach Investigations Report (DBIR), financial gain still is...
Michael Buckbee
6 min read
-
Data Security
Jun 20, 2016
What is The Cyber Kill Chain and How to Use it Effectively
The cyber kill chain maps the stages of a cyberattack from the early reconnaissance stages to data exfiltration. The cyber kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).
Michael Buckbee
4 min read
-
Data Security
Jun 07, 2016
Password Security Tips for Very Busy People
If you needed another reminder that you shouldn’t use the same password on multiple online sites, yesterday’s news about the hacking of Mark Zuckerberg’s Twitter and Pinterest accounts is your...
Michael Buckbee
4 min read
-
Data Security
May 23, 2016
How has Ransomware Impacted the US Government?
Ransomware crimes have been soaring this year. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state and local governments, law enforcement...
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital