Articles by
Kilian Englert

Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.
Threat Update #14 – Post-Ransomware Recovery
To stop ransomware, every second counts. But once the threat is contained, the race is on to get back up and running after a ransomware incident. Click to watch Kilian Englert...
Threat Update #13 – Slashing exposed data to survive ransomware attacks
As if ransomware weren’t bad enough, global group access raises risk exponentially. Once attackers land on a network, they can open, copy, change, or delete any and all files left...
Threat Update #12 – Does Zerologon Change the Game?
Cybercriminals are using the Zerologon exploit to fast track lateral movement and privilege escalation. If left unpatched, the exploit lets attackers use the password of the primary domain controller to...
Threat Update #11 – Attack Attribution
In cybersecurity, incident response is the big game and analysis is the postgame wrap-up. After the threat is contained, security investigators can dive into what they’ve found to look for...
Threat Update #10
An alert notifies you that something suspicious is going on. Minutes matter, so you call the Varonis Incident Response team to help. Security investigators must act fast, but where do...
Varonis Threat Update #9
When ransomware strikes, minutes matter. But an attack may not always be what it seems. That’s because ransomware can serve as a clever – and effective – smokescreen designed to...
Varonis Threat Update #8
Emotet and Ryuk attacks are coming fast and furious, and they’re highly damaging. We’re seeing a huge surge in ransomware worldwide as criminal groups amp up their efforts to grab...
COVID-19 Threat Update #6
Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...
COVID-19 Threat Update #5
The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...
COVID-19 THREAT UPDATE #4
Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...