Data Security
Current Privacy Risks in Genetic Testing
Jan 18, 2016
The idea of taking a direct-to-consumer(DTC) genetic test is intriguing. What was once considered an expensive test that could only be performed in a medical environment can now be purchased...
Varonis Seven Part Guide to Penetration Testing
Jan 10, 2016
Our sprawling pen-testing series has taken on a life of its own! For your convenience and blog reading pleasure, we’ve assembled all the links to this six seven part series below....
Penetration Testing Explained, Part VI: Passing the Hash
Jan 06, 2016
We’re now at a point in this series where we’ve exhausted all our standard tricks to steal credentials — guessing passwords, or brute force attacks on the hash itself. What’s...
Varonis and the Building Security in Maturity Model (BSIMM)
Jan 05, 2016
With major security threats and vulnerabilities making headlines daily, it’s good to hear there’s now a way for organizations to share experiences and strategically work together. Through the Building Security...
Data Security’s Tower of Jenga
Jan 04, 2016
Over the holiday break, I had a chance to see “The Big Short”, the movie based on Michael Lewis’s book about the housing bubble. Or more accurately, about how a...
Design Thinking for your Data Strategy
Dec 04, 2015
A fact of life for many Chief Data Officers (CDOs) is that once you’ve achieved certain milestones in your data strategy, your focus will inevitably shift to a new milestone...
Penetration Testing Explained, Part V: Hash Dumping and Cracking
Dec 02, 2015
In the previous post in this series, I guessed a local password and then tried various ways to move laterally within my mythical Acme network. But what happens if you can’t...
A Brief History of Ransomware
Nov 10, 2015
Ransomware’s Early Days The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS Cyborg1. Harvard-trained evolutionary biologist Joseph L. Popp sent 20,000 infected...
Introducing Varonis UBA Threat Models
Nov 05, 2015
If you’re a regular reader of our blog, you know that we feel that the perimeter is dead, and that the battle against insider (and outsider) threats is won with...
Penetration Testing Explained, Part IV: Making the Lateral Move
Nov 03, 2015
You can think about the post-exploitation part of penetration testing as an army or rebel force living off the land. You’re scrounging around the victim’s website using what’s available —...
Our Version 1.0 List of Penetration Testing Resources
Oct 15, 2015
I barely scratched the surface of penetration testing in my own blogging, and I’ve already amassed a long list of resources. So rather than withhold any longer, I’ll spill the...
Interview with Pen Testing Expert Ed Skoudis
Oct 13, 2015
We’re very excited to present this Q&A with Ed Skoudis. Skoudis is a very large presence in the security world. Here’s just a snippet from his lengthy bio: founder of...
Try Varonis free.
Deploys in minutes.