Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Azure Bicep: Getting Started and How-To Guide

Are you deploying resources to Azure and trying to use Azure Resource Manager (ARM) templates? Are you finding the JSON syntax confusing? Microsoft heard the criticism and introduced a new...

Read More

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims...

Read More

Azure Automation using PowerShell Runbooks

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Read More

Cybersecurity Threats Resource Center

Cybersecurity threats are constantly evolving and knowing how to protect and the latest threat facing your organization is an ongoing battle. Your security department should stay on top of any...

Read More

Threat Update 41 – Viewer Questions

At the end of each Threat Update episode, we invite the audience to ask questions or leave comments, so we took the opportunity to respond to a few. Join Kilian...

Read More

What is Privileged Access Management (PAM) and Why It’s Important to Your Organization

Privileged Access Management, or PAM, is one of the most effective processes and preventative systems available to organizations who want to reduce the risk their employees, partners, vendors, systems, and...

Read More

April 2021 Malware Trends Report

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...

Read More

YARA Rules Guide: Learning this Malware Research Tool

YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns. In this article I will cover: How YARA...

Read More

Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS

Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and...

Read More

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.