Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

PowerShell Resource Center

PowerShell is a shell scripting framework developed by Microsoft originally designed for the administration of Windows systems. It is a standard but powerful tool for systems administrators, because it allows...

Read More

Cybersecurity Maturity Model Certification (CMMC): What You Need to Know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across DoD contractors. It is a new framework for ensuring that the more than 300,000 companies in...

Read More

Introducing the Varonis Remote Work Update

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

Read More

SharePoint vs. SharePoint Online: Full Comparison

SharePoint is a workplace collaboration system built by Microsoft and used for file sharing in Office 365, document management, messaging, and for its ability to produce statistics on how business...

Read More

24 Essential Penetration Testing Tools

Penetration testing has become an essential part of the security verification process. While it’s great that there are many penetration testing tools to choose from, with so many that perform...

Read More

PowerShell Remoting: Cheat Sheet and Guide

Windows PowerShell 2.0 made a powerful new technology available for system administrators: remoting. Remoting has increased in importance in each PowerShell iteration since then, and future Microsoft products will rely...

Read More

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Ensuring that your Azure cloud service is compliant with the regulations that cover customer data can be complex. Each set of regulations – HIPAA, PCI, GDPR, and the CCPA –...

Read More

Is Microsoft Office 365 HIPAA Compliant?

No. That’s the answer in their FAQ. Out-of-the-box Office 365 is not HIPAA compliant, and you need to take the appropriate steps to ensure your organization stays compliant. As the...

Read More

SANS Top 20 Critical Controls to Know

The SANS Top 20 Critical Controls are well-respected guidelines that organizations follow to protect their networks and intellectual property from cyberattacks. SANS is a 30-year-old research and educational organization that...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.