Blog

Data Security

The Definitive Guide to Cryptographic Hash Functions (Part 1)

Rob Sobers

Rob Sobers

Give me any message and I will create a secret code to obscure it. Try it! “This really opened my eyes to AD security in a way defensive work never...

The Difference Between Everyone and Authenticated Users

Rob Sobers

Rob Sobers

In order to maintain proper access controls, it’s crucial to understand what every entity on an access control list (ACL) represents, including the implicit identities that are built into a...

SharePoint Permissions Cheat Sheet

Brian Vecci

Brian Vecci

Complexity is dangerous in the security world.  The harder something is to understand, the harder it is to protect.  SharePoint falls squarely into this category.  Configuring permissions in SharePoint can...

Exchange Journaling and Diagnostics: How to

Rob Sobers

Rob Sobers

Journaling and Diagnostics Logging are services to monitor and audit activity on Microsoft Exchange servers. They provide basic auditing functionality for email activity (e.g. who sent which message to whom)...

5 Things You Should Know About Big Data

Rob Sobers

Rob Sobers

Big data is a very hot topic, and with the Splunk IPO last week seeing a 1999-style spike, the bandwagon is overflowing.  We’re poised to see many businesses pivoting into...

What is OAuth? Definition and How it Works

Rob Sobers

Rob Sobers

OAuth (Open Authentication) is an open-standard authorization protocol or framework that provides applications the ability for “secure designated access.” It is a way for users to grant websites or applications access to their information without giving away their passwords.

Giving Away Your Passwords

Rob Sobers

Rob Sobers

You might have seen the headlines from the past couple of weeks detailing how some employers were demanding employees hand over their Facebook passwords or else. Privacy violation?  Just a...

Fixing the Open Shares Problem

David Gibson

David Gibson

I recently spoke with an IT administrator who had started a manual open share cleanup project—finding and locking down folders and SharePoint sites open to global access groups like Everyone,...

Why Do SharePoint Permissions Cause So Much Trouble?

Brian Vecci

Brian Vecci

SharePoint permissions can be the stuff of nightmares.  At Varonis, we get a chance to meet with a lot of SharePoint administrators and it’s rare that they’re not exhausted trying...

Open Shares

David Gibson

David Gibson

In my post last week, Share Permissions, I promised I’d write a follow up post on “open shares.” Open shares, in a nutshell, are folders that are accessible to all…

Share Permissions

David Gibson

David Gibson

In one of our recent posts, What About Individual Users on ACL’s? I mentioned that some organizations have opted for using Windows share permissions instead of NTFS permissions for file...

Levels of Data Protection

Brian Vecci

Brian Vecci

Wednesday, I spoke at ISSA’s monthly chapter meeting in Colorado Springs. Speaking at ISSA chapter events is great, because it’s always an intelligent crowd that quickly grasps issues around data...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.