A Sysadmins Guide to Thanksgiving

Continue Reading

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

Continue Reading

Six Authentication Experts You Should Follow on Twitter

Our recent ebook shows what’s wrong with current password-based authentication technology. Luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people you should follow and why: 1. Johannes Ullrich @johullrich Considered to be one of the 50 most powerful people in Networking by Network World,…

Continue Reading

ebook-credential

New Varonis eBook Helps You Hacker-Proof Passwords and Other Credentials

Are you really who you claim to be? That’s the key question that authentication tries to solve. NTLM, Kerberos, one-way hashing, challenge-response protocols, and two-factor authentication are just some of the technologies that have been developed to prove user identities and foil intruders. In recent years though, hackers have become far cleverer about getting around…

Continue Reading

Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…

Continue Reading

password generator

How to Be Your Own Best Password Generator

Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing or looking up  password hashes in large pre-computed tables. How bad is our collective password making abilities? You can see for yourself. After the epic…

Continue Reading

NATURE and IT

What Nature Taught Us about IT Security

And The One Thing We Still Haven’t Figured Out I recently came across Drew Barrymore’s picture of a curious insect, Phyllium pulchrifolium which camouflages itself as a leaf. It made me think about how utterly ingenious nature’s defense mechanisms can be, and the oddly fascinating parallels to information security. (Above: the Phyllium pulchrifolium “encrypting” itself.)…

Continue Reading

6-0-product-shots

The Metadata Framework 6.0 is Here!

We’ve been working on making improvements to many of our products, making them easier to use and helping you save time and resources and reduce the risk of a data breach. We’re excited to announce that version 6 of the Varonis Metadata Framework will be Generally Available (GA) by the end of 2014. What’s new…

Continue Reading

scawards2015nominee_678599_678600

Please Vote for Varonis in the SC Magazine Awards!

Dear Metadata Readers, When you have a moment please support Varonis by voting for us in SC Magazine’s 2015 *SC Awards. We’re nominated in the following Reader’s Trust Categories: Best Identity Management Solution: Varonis DataPrivilege Best Email Security Solution: Varonis DatAdvantage for Exchange Best DLP Solution: Varonis IDU Classification Framework Only subscribers of SC Magazine…

Continue Reading

legal hold

How Varonis Helps with Legal Hold

If and when your company ever comes under litigation, it’s likely that attorneys will send you a letter asking you to put a legal hold on potential evidence, meaning files, folders, emails, etc. must be preserved without modification pending litigation.  Failure to protect evidence can result in court-ordered sanctions as well as fines if the…

Continue Reading