Anabas_testudineus_Day

Anatomy of a Phish: New Varonis eBook Connects Social Attacks and APTs to Human-Generated Data

Security analysts have been telling us that phishing incidents have been on the rise, and the threat will get worse in the coming years. Sure phishing and other social attacks are insanely clever, tricking victims into effectively inviting hackers in through the front door. But when cyber thieves also use advanced persistent threats or APTs—embedding…

800px-Moscone_Center,_San_Francisco_(2013)

The ‘Varonis Track’ at RSA 2014

The tagline for the RSA Conference to be held later this month (2/24 – 2/28) at San Francisco’s Moscone Center is “where the world talks security.”  The Varonis team will also be there (South Expo #2309) to talk security.  At the Metadata Era, we’ve been lately focusing on new threats based on a combination of…

beenhacked

Secrets to Preventing POS-based Attacks in Retail

There’s still much mystery surrounding the recent cyber heist in which tens of millions of credit card numbers were removed from a major retailer’s POS system, though we learn more almost every day. The always indispensable Krebs is a good starting point for background information and very informed speculation.  There are good reasons—based on FBI…

virus

How DatAdvantage Helps With Virus Recovery

During my conversations with our customers, it is always great to hear how they are leveraging Varonis to support their data governance initiatives. It is even better when we hear about scenarios that reach outside their original use-cases, like recovering from a virus. Today we are sharing a story from a customer who was recently…

Report: Nearly Half of IT Staff Fear Unauthorized Access To Virtual Servers

There are reportedly over 50 million VMs residing on servers.  Varonis surveyed IT staff at VMWorld San Francisco and VMWorld Barcelona in 2012 to answer questions about VM adoption, saturation, use cases, deployment, security and more. Virtualization yields countless benefits.  Our results show that 76% of respondents use VMs for fast deployment, 74% cite disaster…

The Difference Between Everyone and Authenticated Users

In order to maintain proper access controls, it’s crucial to understand what every entity on an access control list (ACL) represents, including the implicit identities that are built into a Windows environment. There are a lot of built-in accounts with obscure names and vague descriptions, so it can be confusing. One question I often get…

InfoSecurity 2012 Highlights

Last week I was fortunate to attend InfoSecurity 2012 in London. The energy level seemed much higher than in previous years, for both attendees and exhibitors.  Just under 13000 people were there, up  24% from last year, and those that stopped by our booth seemed to have a real sense of urgency about data protection, and…