Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

COVID-19 Threat Update #2

The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices.  It only takes one compromised remote...

Read More

The No Hassle Guide to Event Query Language (EQL) for Threat Hunting

Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...

Read More

How To Prevent Ransomware: The Basics

According to the 2019 Verizon Data Breach Report, ransomware is the 2nd most frequent malware attack behind command & control (C2) attacks.  Email is still the top delivery mechanism for...

Read More

9 Infamous APT Groups: Fast Fact Trading Cards

Advanced Persistent Threat (APT) groups are widely classified as organizations that lead, “attacks on a country’s information assets of national security or strategic economic importance through either cyberespionage or cybersabotage.”...

Read More

Varonis eBook: WMI Events and Insider Surveillance

If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...

Read More

Ransomware Meets Its Match With Automated Cyber Defenses

The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...

Read More

107 Must-Know Data Breach Statistics for 2020

As more and more companies experience crippling security breaches, the wave of compromised data is on the rise. Data breach statistics show that hackers are highly motivated by money to...

Read More

How to Use Microsoft Teams Safely: Security and Compliance Basics

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

What is OSINT?

As information becomes more available from a vast number of sources, skilled researchers can often find nearly any type of data they’re looking for, provided they know where to look....

Read More

Data Privacy Guide: Definitions, Explanations and Legislation

Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.