Varonis Perspective on the Sony Breach

While we have few details on the Sony Pictures attack itself, this very public breach (or pwning in hacker slang) has shown the extent of the actual exposure—it is massive. The always informative Krebs knows, at this point at least, as much as the rest of us—possible North Korean connection and perhaps the use of destructive erase-all malware….

Continue Reading


Crypto’s Fatal Flaw: Stealing the Master Key

At the beginning of the year, Cindy and I attended a crypto workshop held at a local college in NYC. We heard experts talk about a fact of life well known in the security world, less so in the IT space: crypto is not very healthy. The prime culprits are a slew of advanced persistent…

Continue Reading


Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…

Continue Reading


Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…

Continue Reading


Windows Server 2003 End of Life is Approaching

The support for Windows Server 2003 is slated to end July 14, 2015, so it’s time to start thinking about migrating if you haven’t already. According to one TechNet blogger, the average Windows Server migration takes 200 days! The good news is that you aren’t the only IT department facing this reality. It’s anticipated that…

Continue Reading

A Sysadmins Guide to Thanksgiving

Continue Reading

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

Continue Reading

Six Authentication Experts You Should Follow on Twitter

Our recent ebook shows what’s wrong with current password-based authentication technology. Luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people you should follow and why: 1. Johannes Ullrich @johullrich Considered to be one of the 50 most powerful people in Networking by Network World,…

Continue Reading


New Varonis eBook Helps You Hacker-Proof Passwords and Other Credentials

Are you really who you claim to be? That’s the key question that authentication tries to solve. NTLM, Kerberos, one-way hashing, challenge-response protocols, and two-factor authentication are just some of the technologies that have been developed to prove user identities and foil intruders. In recent years though, hackers have become far cleverer about getting around…

Continue Reading

Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…

Continue Reading