Blog

Data Security

The Essential Guide to Identifying Your Organization’s Most Sensitive Content

Michael Buckbee

Michael Buckbee

What do hackers want? If you answered money — always a safe bet — then you’d be right. According to the Verizon Data Breach Investigations Report (DBIR), financial gain still is...

What is The Cyber Kill Chain and How to Use it Effectively

Michael Buckbee

Michael Buckbee

The cyber kill chain maps the stages of a cyberattack from the early reconnaissance stages to data exfiltration. The cyber kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).

Password Security Tips for Very Busy People

Michael Buckbee

Michael Buckbee

If you needed another reminder that you shouldn’t use the same password on multiple online sites, yesterday’s news about the hacking of Mark Zuckerberg’s Twitter and Pinterest accounts is your...

How has Ransomware Impacted the US Government?

Michael Buckbee

Michael Buckbee

Ransomware crimes have been soaring this year. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state and local governments, law enforcement...

Ransomware That Deletes Your Files

Michael Buckbee

Michael Buckbee

Organizations with legal obligations to prevent data from improper alteration or destruction—I’m talking to you healthcare orgs that fall under HIPAA– really need to pay close attention to a new...

CyptMix Ransomware Claims to Donate Your Ransom Payment to Charity

Michael Buckbee

Michael Buckbee

Unlike traditional ransomware notes that rely on fear-based tactics, a new ransomware strain called CyptMix preys on your generosity. Part of the ransom note reads: “Your money will be spent...

Lessons From the Goldcorp Extortion

Michael Buckbee

Michael Buckbee

Unfortunately, another breach has made the headlines and it’s déjà vu all over again. The narrative surrounding the Goldcorp breach is similar to other doxing attacks: Attackers appear to have...

Interesting Deloitte Research on Insider Threats

Michael Buckbee

Michael Buckbee

We’re excited that Deloitte, the international auditing and consulting firm, has been raising the alarms on insider threats. They have some content in the CIO section of the Wall Street...

Visualize your risk with the DatAlert dashboard

Michael Buckbee

Michael Buckbee

Last week, we introduced over 20 new threat models to help defend your data against insider threats, ransomware attacks and threats to your most sensitive data. But with all this...

Football player hacked live during NFL draft

Rob Sobers

Rob Sobers

Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from...

Cryptolocker, lockouts and mass deletes, oh my!

Michael Buckbee

Michael Buckbee

DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your...

New Varonis eBook Helps IT Kickstart Their Pen Testing Program

Michael Buckbee

Michael Buckbee

Hackers are able to break into systems and move around easily without being detected. How is this possible with so much invested in firewalls, malware scanners, and other intrusion detection...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.