More of Our Interview with Pen Tester Ken Munro [PODCAST]

pen-testing

We have more Ken Munro in this second part of our podcast.  In this segment, Ken tells us how he probes wireless networks for weaknesses and some of the tools he uses. One takeaway for me is that the PSKs or passwords for WiFi networks should be quite complex, probably at least 12 characters. The […]

Continue Reading →

5 Tips on Evaluating Vendors: What Your InfoSec Peers Are Doing

pexels-photo-68491

While it might be possible to explain your organization’s security paradigm in a single phrase – we prefer “security from the inside out”. Can you say the same for your vendors and contractors? Probably not. With the rise of cloud computing and outsourced IT services, data security has become the most critical issue for companies […]

Continue Reading →

Interview With IoT Pen Tester Ken Munro [PODCAST]

pen-testing

If you want to understand the ways of a pen tester, Ken Munro is a good person to listen to. An info security veteran for over 15 years and founder of UK-based Pen Test Partners, his work in hacking into consumer devices — particularly coffee makers — has earned lots of respect from vendors. He’s […]

Continue Reading →

Varonis Connect Customer Conferences: Ready, Set, Go!

connect

It’s that time of year again! We’ve kicked off our annual series of Varonis Connect events and due to high customer demand, we’ve doubled the number of events from 2015 to 2016 – we’re expecting twice as many customer attendees. Varonis Connect events are free educational and networking conferences that we expect to draw more […]

Continue Reading →

PwC Report Shows That Cybercrime Is a Top C-Level Concern

taxes-tax-evasion-police-handcuffs

One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of its 19th Global Economic Crime Survey. It revealed the kinds of numbers that get the attention of executives, and for public companies, their shareholders as […]

Continue Reading →

Podcast Episode #5 – How Does our Data get Compromised?

ioss

Could it be that files are open to everyone? Or is because we have weak passwords? How about social engineering – one of the oldest trick in the book? Perhaps it is all of the above? In our fifth edition of our Inside Out Security Show, security experts David Gibson and Michael Buckbee joined me […]

Continue Reading →

Real World File System Statistics [INFOGRAPHIC]

sky-space-dark-galaxy

We knew we had some interesting stats in our customer risk assessment results we released last week. But we were surprised in a nice way when it did, ahem, receive some attention in the media. After taking a deep breath, I took another look at the data and have some some additional comments to share. […]

Continue Reading →

Varonis Keeps Union Bank’s Data Safe from Insider Threats and External Attacks

union-bank-image

Today we’re excited to share another interesting customer success story out of the UK. Union Bank UK PLC needed better visibility into the different types of sensitive data its employees were storing and accessing across its file systems. Regulatory requirements necessitated that the bank’s IT department regularly audit and report on who was accessing sensitive […]

Continue Reading →

Samas, Cerber, Surprise: Three New Ransomware Variants to Have On Your Radar

ransomware-cerber-samas-surprise

As of late, the weekly press coverage of ransomware has been building a kind of brand recognition that’s the envy of many legitimate IT vendors. Ransomware’s own success has made it difficult to differentiate between the quickly evolving product variants — differences with how you get infected, what’s encrypted, ransom amount and special new features. […]

Continue Reading →

Podcast Episode #4 – Data Breach Notification Law

Data Breach Notification Law

Continue Reading →

4 Step Guide to Managing Network Share Permissions

steps

Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics of this have not dramatically changed since Windows Server 2003 and are relatively straightforward. However, after configuring the resource shares and the individual NTFS permissions […]

Continue Reading →