Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers

While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi...

Read More

What is CASB? All About Cloud Access Security Brokers

Cloud Access Security Brokers (CASB) are a security application that helps organizations manage and protect the data stored in the cloud. Gartner advises organizations to find a “Goldilocks” CASB solution...

Read More

Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips

Microsoft is pushing Teams- part of Office 365 – hard, and they report adoption rates that outpace Slack. You might not realize that Teams lives on top of SharePoint Online,...

Read More

Insider Threats: Stealthy Password Hacking With Smbexec   

As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...

Read More

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is everything, cyber-attacks and data breaches are a massive threat to organizations across the world. Data breaches are among the...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More

What is Metasploit? The Beginner’s Guide

Penetration testing allows you to answer the question, “How can someone with malicious intent mess with my network?” Using pen-testing tools, white hats and DevSec professionals are able to probe...

Read More

How to Use John the Ripper: Tips and Tutorials

John the Ripper (JtR) is one of the hacking tools the Varonis IR Team used in the first Live Cyber Attack demo, and one of the most popular password cracking...

Read More

11 Popular Programming Languages to Open Doors

Learning programming languages can open doors to new opportunities. But with so many languages out there, it’s imperative to pick the appropriate ones to best suit your career, personal goals...

Read More

Capital One’s Cloud Breach & Why Data-Centric Security Matters

Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.