Six Authentication Experts You Should Follow on Twitter

Our recent ebook shows what’s wrong with current password-based authentication technology. Luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people you should follow and why: 1. Johannes Ullrich @johullrich Considered to be one of the 50 most powerful people in Networking by Network World,…

Continue Reading


New Varonis eBook Helps You Hacker-Proof Passwords and Other Credentials

Are you really who you claim to be? That’s the key question that authentication tries to solve. NTLM, Kerberos, one-way hashing, challenge-response protocols, and two-factor authentication are just some of the technologies that have been developed to prove user identities and foil intruders. In recent years though, hackers have become far cleverer about getting around…

Continue Reading

Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…

Continue Reading

password generator

How to Be Your Own Best Password Generator

Let’s face it people, we’re bad at coming up with our own passwords. They’re too short, too obvious, and hackers have gotten very good at breaking them —either by outright guessing or looking up  password hashes in large pre-computed tables. How bad is our collective password making abilities? You can see for yourself. After the epic…

Continue Reading


What Nature Taught Us about IT Security

And The One Thing We Still Haven’t Figured Out I recently came across Drew Barrymore’s picture of a curious insect, Phyllium pulchrifolium which camouflages itself as a leaf. It made me think about how utterly ingenious nature’s defense mechanisms can be, and the oddly fascinating parallels to information security. (Above: the Phyllium pulchrifolium “encrypting” itself.)…

Continue Reading


The Metadata Framework 6.0 is Here!

We’ve been working on making improvements to many of our products, making them easier to use and helping you save time and resources and reduce the risk of a data breach. We’re excited to announce that version 6 of the Varonis Metadata Framework will be Generally Available (GA) by the end of 2014. What’s new…

Continue Reading


Please Vote for Varonis in the SC Magazine Awards!

Dear Metadata Readers, When you have a moment please support Varonis by voting for us in SC Magazine’s 2015 *SC Awards. We’re nominated in the following Reader’s Trust Categories: Best Identity Management Solution: Varonis DataPrivilege Best Email Security Solution: Varonis DatAdvantage for Exchange Best DLP Solution: Varonis IDU Classification Framework Only subscribers of SC Magazine…

Continue Reading

legal hold

How Varonis Helps with Legal Hold

If and when your company ever comes under litigation, it’s likely that attorneys will send you a letter asking you to put a legal hold on potential evidence, meaning files, folders, emails, etc. must be preserved without modification pending litigation.  Failure to protect evidence can result in court-ordered sanctions as well as fines if the…

Continue Reading


PoS Malware Mitigation Advice from the Pros

There’s still much we don’t know about the attacks that targeted retailers’ PoS systems over the last year. We do know for certain that Backoff, BlackPos, and its variants were used as the RAM scraping software, and the hackers had considerable time to remove or exfiltrate the data. But there are still questions about how…

Continue Reading


How Varonis Helps with e-Discovery

If you’ve ever had the misfortunate of participating in litigation of any sort, you know that e-Discovery can be a massive pain for IT. It can be distracting, time-consuming, and stressful. Varonis can help you successfully navigate the e-Discovery process by automatically discovering (and quarantining) relevant information in file servers, SharePoint sites, and email. To…

Continue Reading