Latest articles

Australian Privacy Act 2022 Updates

Dec 19, 2022
A series of stunning data breaches in 2022 has prompted lawmakers to begin making changes to the 1988 Australian Privacy Act in the form of the new Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022.

What Is Zero Trust? Architecture and Security Guide

Sep 09, 2022
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.

What is Mimikatz? The Beginner's Guide

Aug 26, 2022
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.

What is a Brute Force Attack? Definition

Dec 08, 2021
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.

What is a Brute Force Attack?

Jul 20, 2021
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.

What is PCI Compliance: Requirements and Penalties

Jul 20, 2021
PCI compliance provides businesses with guidance on protecting customer credit card information and cut down on credit card fraud. Read on to find out how to protect your company from fines and breaches.

Data Migration Guide: Strategy Success & Best Practices

Jul 19, 2021
Wondering what you need to know about data migration? Our guide to success will provide you with all the information you're looking for!

What is an SMB Port + Ports 445 and 139 Explained

May 07, 2021
An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.

5 Data Governance Reports for Data Owners

Apr 27, 2021
This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...

Permission Propagation: Info and Tips

Apr 23, 2021
It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.

How Varonis Limits Organization-Wide Exposure

Apr 07, 2021
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

What is Data Integrity and How Can You Maintain it?

Mar 25, 2021
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
No overhead. Just outcomes.