Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

Active Directory Resource Center

Active Directory is the foundation for a majority of enterprise networks, and cybersecurity professionals need to have a solid understanding of it to protect and secure sensitive data. Most any...

Read More

PowerShell ForEach: Loop and Object Basics

PowerShell is a ubiquitous tool for system administrators and can be used to automate many common tasks across your Windows environment. Like most other programming languages, PowerShell makes use of...

Read More

What is DNS TTL + Best Practices

DNS TTL (time to live) is a setting that tells the DNS resolver how long to cache a query before requesting a new one. The information gathered is then stored...

Read More

SharePoint Online Security: Best Practices and Audit Tips

SharePoint Online is a powerful cloud-based service from Microsoft that allows your team to share Office 365 files and data. Many companies are now migrating from on-premises Office 365 installations...

Read More

PowerShell Resource Center

PowerShell is a shell scripting framework developed by Microsoft originally designed for the administration of Windows systems. It is a standard but powerful tool for systems administrators, because it allows...

Read More

Data Privacy Resource Center

Data privacy and compliance is a crucial subject for every company working with user data. Depending on your company, how you work with data, and who you collect data on,...

Read More

Cybersecurity Maturity Model Certification (CMMC): What You Need to Know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across DoD contractors. It is a new framework for ensuring that the more than 300,000 companies in...

Read More

Introducing the Varonis Remote Work Update

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

Read More

SharePoint vs. SharePoint Online: Full Comparison

SharePoint is a workplace collaboration system built by Microsoft and used for file sharing in Office 365, document management, messaging, and for its ability to produce statistics on how business...

Read More

24 Essential Penetration Testing Tools

Penetration testing has become an essential part of the security verification process. While it’s great that there are many penetration testing tools to choose from, with so many that perform...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.