Ticket_example

In Search of Kerberos’s Golden Ticket

In a Kerberos environment, all users get tickets, or more specifically TGTs (Ticketing Granting Tickets). It’s the starting point for gaining access to services—network files, email, apps, etc.  In Windows, there’s one user who stands out, the all-powerful domain administrator. They have access to the keys of the kingdom, literally—the Domain Controller on which the…

Continue Reading

FCA

How Varonis Helps with the Financial Conduct Authority (FCA)

The Financial Conduct Authority (FCA), previously Financial Services Authority (FSA), in the United Kingdom is responsible for regulating financial firms that provide services to consumers and maintain the integrity of the UK’s financial markets. Effective controls and processes that improve the security of customer data are critical to the FCA in order to prevent high…

Continue Reading

Announcing the Varonis Connect Community

Do you have feature requests for us?  Ever want to discuss a product customization with an engineer?  Looking for a certain how-to video?  Look no further!  Today, we’re happy to announce a new online community for Varonis customers and partners. Varonis Connect is a friendly community where you can exchange ideas and information, participate in…

Continue Reading

CJIS

How Varonis Helps with Criminal Justice Information Services (CJIS) Security Policy

Since law enforcement agencies need timely and secure access to data to stop and reduce crime, the Criminal Justice Information Services(CJIS) Security Policy provides Criminal and Noncriminal Justice Agencies with a minimum set of security requirements to access the Federal Bureau of Investigation information systems. This security policy applies to every individual with access to,…

Continue Reading

Cerberus_(PSF)

Kerberos Weaknesses: Pass the Ticket Is a Real Threat

August is always a good time to check up on the dark side.  Black Hat had its annual conference earlier this month, and there’s always presentations worth looking at.  I’ve been writing about Kerberos recently, and while it’s a big improvement over Microsoft’s NLTM, nothing is ever perfect.  I came across a presentation that looks…

Continue Reading

800px-SF_Police_search_the_car

Cloud Storage and the 4th Amendment: It’s Complicated

With the recent spat between the US Justice Department and Microsoft over emails stored in the cloud, the 4th Amendment remains in the rear-view mirror for IT people. Cindy recently posted about some of the issues related to Big Data and the 4th, but there’s an even more fundamental question about data stored in the…

Continue Reading

800px-Moscone_Center,_San_Francisco_(2013)

VMworld Attendees: Chance to Win Wireless Speakers

Are you attending VMworld 2014 in San Francisco? Had your eyes on the very cool Jabra Wireless Speakers?  Like to tweet pictures of yourself? If you answered “yes” to all of these, then you’re in luck! Stop by the Varonis booth (#2323) to enter our speaker contest. Instructions below.    

Continue Reading

What You May Have Missed

What You May Have Missed

1. Before we jump on board the Internet of Things, let’s consider this recent hack experiment in Michigan. Working in cooperation with a local traffic department, researchers were able to monitor the IP packets on a wireless network connecting traffic lights. The protocol is similar to 802.11n—WiFi—but relies on proprietary hardware not generally available to…

Continue Reading

discharge data

Holes in HIPAA’s Rules Let Health Data Travel

In 2013, the FTC’s chief technologist and leading privacy expert, Latanya Sweeney and her team began a project to document health data that is bought, sold, and shared. They learned an unsettling fact about this data: it’s unclear and difficult to know with certainty all the entities who access it. Doing the best with what…

Continue Reading

Announcing DatAnywhere 2.0

We’re pleased to announce that version 2.0 of Varonis DatAnywhere is now generally available. Our engineering team continues to add new features at a rapid pace! What’s new in 2.0? Stub files. Stub files make files appear and behave as if they’re stored locally on the client, but they remain safely on your file shares…

Continue Reading