Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

What is HIPAA Compliance? Your 2019 Guide + Checklist

HIPAA fines cost ten companies $28.7 million in 2018, which broke the previous 2016 record for HIPAA fines by 22%! That’s only 10 HIPAA cases resolved out of 25,912 complaints...

Read More

7 Key Risk Indicators in the Varonis Active Directory Dashboard

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Read More

What is SOX Compliance? Everything You Need to Know in 2019

The United States Congress passed the Sarbanes-Oxley Act in 2002 and established rules to protect the public from fraudulent or erroneous practices by corporations and other business entities. The goal...

Read More

MITRE ATT&CK Framework: Everything You Need to Know

MITRE developed ATT&CK as a model to document and track various techniques attackers use throughout the different stages of a cyberattack to infiltrate your network and exfiltrate data. ATT&CK stands...

Read More

Use Varonis For HIPAA Compliance Software

If you want to avoid a large HIPAA fine – and you do – you need to invest in HIPAA compliance software that protects your data and alerts you of...

Read More

What is Data Governance: Definition + Best Practices

Data Governance is the process and procedure organizations use to manage and protect their data. In this context, data can mean either all or a subset of a company’s digital...

Read More

Data Governance in Healthcare: Your Complete Guide

Of all the verticals that need a complete data governance policy – healthcare might be at the top. Consider the incredible amount of healthcare data that exists for any human,...

Read More

Active Directory Migration Tool (ADMT): Your Essential Guide

There are days where you need to move objects in a domain or forest to somewhere else, and those days require the Active Directory Migration Tool (ADMT). Hopefully, any moves...

Read More

What is FISMA Compliance? Regulations and Requirements

FISMA stands for the Federal Information Security Management Act, which the United States Congress passed in 2002: it requires federal agencies to implement information security plans to protect sensitive data....

Read More

Active Directory Domain Controller (AD DC) Could Not Be Contacted [SOLVED]

When your users report that they see “an active directory domain controller for the domain could not be contacted” there could be a few different causes for this issue. Most...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.