Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

What is ISO 27001 Compliance? Essential Tips and Insights

The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. In today’s world, with so many industries now reliant upon the...

Read More

How to Use Wireshark: Comprehensive Tutorial + Tips

If you find yourself troubleshooting network issues, and you have to inspect individual packets, you need to use Wireshark. Wireshark is the de facto, go-to, you-need-to-know-how-to-use, application to capture and...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More

What is Metasploit? The Beginner’s Guide

Penetration testing allows you to answer the question, “How can someone with malicious intent mess with my network?” Using pen-testing tools, white hats and DevSec professionals are able to probe...

Read More

How to Use John the Ripper: Tips and Tutorials

John the Ripper (JtR) is one of the hacking tools the Varonis IR Team used in the first Live Cyber Attack demo, and one of the most popular password cracking...

Read More

Azure Active Directory: Best Practices and Tutorials

Are you one of the 90% of organizations that Gartner predicts will move to hybrid cloud infrastructure by 2020? Most of that 90% will use Microsoft Azure Active Directory for...

Read More

AWS vs Azure vs Google: Cloud Services Comparison

Doing business in a cloud is more than just a lovely way to pass the time. Cloud computing services make sense from both a strategic and performance angle. However, business...

Read More

How Varonis Levels Up Your Incident Response

It’s a good time to be in cybersecurity. Incident Response(IR) teams are growing like crazy, and there are more jobs in cybersecurity than qualified candidates. The challenge for organizations is...

Read More

Permission Propagation: Info and Tips

Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all...

Read More

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

You may have heard that Microsoft changed their guidance on password expiration policies. On May 23, 2019, they released a blog post explaining their decisions. As cybersecurity experts already know,...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.