800px-Ancient_warded_lock_key_transparent

Crypto’s Fatal Flaw: Stealing the Master Key

At the beginning of the year, Cindy and I attended a crypto workshop held at a local college in NYC. We heard experts talk about a fact of life well known in the security world, less so in the IT space: crypto is not very healthy. The prime culprits are a slew of advanced persistent…

Continue Reading

636px-Cartomante

Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…

Continue Reading

varonis-office-365

Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…

Continue Reading

2003-donothing-migrate-and-upgrade

Windows Server 2003 End of Life is Approaching

The support for Windows Server 2003 is slated to end July 14, 2015, so it’s time to start thinking about migrating if you haven’t already. According to one TechNet blogger, the average Windows Server migration takes 200 days! The good news is that you aren’t the only IT department facing this reality. It’s anticipated that…

Continue Reading

A Sysadmins Guide to Thanksgiving

Continue Reading

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

Continue Reading

Six Authentication Experts You Should Follow on Twitter

Our recent ebook shows what’s wrong with current password-based authentication technology. Luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people you should follow and why: 1. Johannes Ullrich @johullrich Considered to be one of the 50 most powerful people in Networking by Network World,…

Continue Reading

ebook-credential

New Varonis eBook Helps You Hacker-Proof Passwords and Other Credentials

Are you really who you claim to be? That’s the key question that authentication tries to solve. NTLM, Kerberos, one-way hashing, challenge-response protocols, and two-factor authentication are just some of the technologies that have been developed to prove user identities and foil intruders. In recent years though, hackers have become far cleverer about getting around…

Continue Reading

Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…

Continue Reading

password generator

How to Be Your Own Best Password Generator

Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing or looking up  password hashes in large pre-computed tables. How bad is our collective password making abilities? You can see for yourself. After the epic…

Continue Reading