Quantcast
Channel: Varonis Blog » SecurityVaronis Blog
Browsing latest articles
Browse All 42 View Live

Image may be NSFW.
Clik here to view.

Express Risk Assessment

According to the latest Verizon DBIR, over 49% of data breaches stem from miscellaneous errors and insider misuse, largely due to excessive permissions and unprotected data.  How secure is your data?...

View Article



Image may be NSFW.
Clik here to view.

All Sites SSL All the Time

There’s a real danger to writing about SSLi: namely that someone will accidentally skim across a sentence of your article while operating a motor vehicle and pass out at the wheel. To help mitigate...

View Article

Image may be NSFW.
Clik here to view.

Point of View: User Behavior Analytics and Varonis [White Paper]

User Behavior Analytics, or UBA, has suddenly entered the security conversation. Security folks are talking about it. Analysts are talking about it. It’s in the news. It’s a good conversation to have,...

View Article

Image may be NSFW.
Clik here to view.

What is User Behavior Analytics?

There’s nothing new in using analytics in data protection or breach prevention. Firewalls, for example, analyze packet contents and other metadata, such as IP addresses, to detect and block attackers...

View Article

Image may be NSFW.
Clik here to view.

Will the EU’s Data Protection Regulation Apply to Me?

One of the more complex issues that will have to be resolved with the new Data Protection Regulation (DPR) is what’s being called “extraterritoriality.” As proposed by EU Parliament, the DPR will apply...

View Article


Image may be NSFW.
Clik here to view.

Insider Theft 2015: We’ve Been Warned

Identity Theft Resource Center (ITRC) is my go-to source for a running tally of breaches. As of last week ITRC, which gets its stats from media sources and state agencies, has counted 505 incidents,...

View Article

Image may be NSFW.
Clik here to view.

Gartner Recognizes Varonis in 2015 Market Guide for File Analysis Software

Having spent the past decade pioneering and building out a range of solutions for managing and protecting critical data, we are pleased to report today that Gartner has recognized Varonis in its 2015...

View Article

Image may be NSFW.
Clik here to view.

User Behavior Analytics (UBA) and Insider Theft [White Paper]

Insider theft can be devastating for companies. After all, employees know where the most valuable and sensitive data lives. According to PwC’s 2014 US State of Cybercrime Survey, one-third of...

View Article


Image may be NSFW.
Clik here to view.

Inside Out Security

Data breaches are making headlines more frequently than ever.  Who’s going to be next? It’s time to protect your data from the inside out.  Find out how in our latest video.

View Article


Image may be NSFW.
Clik here to view.

Central Connecticut State University Empowers Professors and Staff with...

Today I’d like to share how Central Connecticut State University (CCSU), a regional, comprehensive liberal arts public university, uses Varonis DatAdvantage for Windows and DataPrivilege to keep its...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing Explained, Part II: RATs!

Remote Access Trojans or RATs are vintage backdoor malware. Even though they’ve been superseded by more advanced command-and-control (C2) techniques, this old, reliable malware is still in use. If you...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing Explained, Part III: Playing with RATs and Reverse Shells

Last week I broke into a Windows 2008 server and inserted a remote access trojan or RAT. Don’t call security, I did this in a contained environment within virtual machines. To continue on with my pen...

View Article

Image may be NSFW.
Clik here to view.

Interview with Pen Testing Expert Ed Skoudis

We’re very excited to present this Q&A with Ed Skoudis. Skoudis is a very large presence in the security world. Here’s just a snippet from his lengthy bio: founder of Counter Hack, sought-after...

View Article


Image may be NSFW.
Clik here to view.

Protecting Data from the Inside Out

Everyone knows that data breaches can be devastating: destroying reputations, revealing sensitive business emails and documents, compromising intellectual property, and costing millions. So why is it...

View Article

Image may be NSFW.
Clik here to view.

Our Version 1.0 List of Penetration Testing Resources

I barely scratched the surface of penetration testing in my own blogging, and I’ve already amassed a long list of resources. So rather than withhold any longer, I’ll spill the beans in this initial...

View Article


Image may be NSFW.
Clik here to view.

Meanwhile Back at the EU: Safe Harbor Framework Ends With a Whimper

Raise your hands if you knew anything about the US-EU Safe Harbor Framework? I mean before you read all the scary headlines. I thought so! This is one of those rare times when researching obscure areas...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing Explained, Part IV: Making the Lateral Move

You can think about the post-exploitation part of penetration testing as an army or rebel force living off the land. You’re scrounging around the victim’s website using what’s available — shells,...

View Article


Image may be NSFW.
Clik here to view.

Living Off the IT Land With Malware-Less Hacking

We’ve been lately hearing more about the trend in malware-free attacks. At RSA 2015, it was a topic of conversation by security pros. Ed Skoudis told us about it as well in our interview. And Dell...

View Article

Image may be NSFW.
Clik here to view.

Beware: CryptoWall 4.0 is on the loose!

Vulnerabilities and threats are a lot like popularity contests in terms of how they get viewed by the media. The latest threat that’s getting extremely popular— some might even say #winning — is...

View Article

Image may be NSFW.
Clik here to view.

Introducing Varonis UBA Threat Models

If you’re a regular reader of our blog, you know that we feel that the perimeter is dead, and that the battle against insider (and outsider) threats is won with User Behavior Analytics (UBA), which is...

View Article
Browsing latest articles
Browse All 42 View Live




Latest Images