Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…

Continue Reading

password generator

How to Be Your Own Best Password Generator

Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing or looking up  password hashes in large pre-computed tables. How bad is our collective password making abilities? You can see for yourself. After the epic…

Continue Reading


What Nature Taught Us about IT Security

And The One Thing We Still Haven’t Figured Out I recently came across Drew Barrymore’s picture of a curious insect, Phyllium pulchrifolium which camouflages itself as a leaf. It made me think about how utterly ingenious nature’s defense mechanisms can be, and the oddly fascinating parallels to information security. (Above: the Phyllium pulchrifolium “encrypting” itself.)…

Continue Reading


The Metadata Framework 6.0 is Here!

We’ve been working on making improvements to many of our products, making them easier to use and helping you save time and resources and reduce the risk of a data breach. We’re excited to announce that version 6 of the Varonis Metadata Framework will be Generally Available (GA) by the end of 2014. What’s new…

Continue Reading


Please Vote for Varonis in the SC Magazine Awards!

Dear Metadata Readers, When you have a moment please support Varonis by voting for us in SC Magazine’s 2015 *SC Awards. We’re nominated in the following Reader’s Trust Categories: Best Identity Management Solution: Varonis DataPrivilege Best Email Security Solution: Varonis DatAdvantage for Exchange Best DLP Solution: Varonis IDU Classification Framework Only subscribers of SC Magazine…

Continue Reading

legal hold

How Varonis Helps with Legal Hold

If and when your company ever comes under litigation, it’s likely that attorneys will send you a letter asking you to put a legal hold on potential evidence, meaning files, folders, emails, etc. must be preserved without modification pending litigation.  Failure to protect evidence can result in court-ordered sanctions as well as fines if the…

Continue Reading


PoS Malware Mitigation Advice from the Pros

There’s still much we don’t know about the attacks that targeted retailers’ PoS systems over the last year. We do know for certain that Backoff, BlackPos, and its variants were used as the RAM scraping software, and the hackers had considerable time to remove or exfiltrate the data. But there are still questions about how…

Continue Reading


How Varonis Helps with e-Discovery

If you’ve ever had the misfortunate of participating in litigation of any sort, you know that e-Discovery can be a massive pain for IT. It can be distracting, time-consuming, and stressful. Varonis can help you successfully navigate the e-Discovery process by automatically discovering (and quarantining) relevant information in file servers, SharePoint sites, and email. To…

Continue Reading


The Worst Assumption You Can Make About Healthcare Information

There’s a common misconception that HIPAA only applies to database records. It’s somewhat understandable because “health record” is used frequently on the Health and Human Services (HHS) web site. However, if you read the actual language of HIPAA more closely, you’ll see that the rules cover protected health information (PHI) in any electronic format. Have…

Continue Reading


PoS Cyber Attack Insight: Malware Isn’t What You Think It is

As headlines over the last few months have shown, hackers are becoming more and more resourceful at getting through corporate firewalls to directly attack retail terminals and back-end PoS servers. If IT can’t stop them from getting through the front door, is there a second line of defense to, at a minimum, contain the cyber-thieves…

Continue Reading