Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is everything, cyber-attacks and data breaches are a massive threat to organizations across the world. Data breaches are among the...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More

What is Metasploit? The Beginner’s Guide

Penetration testing allows you to answer the question, “How can someone with malicious intent mess with my network?” Using pen-testing tools, white hats and DevSec professionals are able to probe...

Read More

How to Use John the Ripper: Tips and Tutorials

John the Ripper (JtR) is one of the hacking tools the Varonis IR Team used in the first Live Cyber Attack demo, and one of the most popular password cracking...

Read More

11 Popular Programming Languages to Open Doors

Learning programming languages can open doors to new opportunities. But with so many languages out there, it’s imperative to pick the appropriate ones to best suit your career, personal goals...

Read More

Capital One’s Cloud Breach & Why Data-Centric Security Matters

Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...

Read More

How Varonis Levels Up Your Incident Response

It’s a good time to be in cybersecurity. Incident Response(IR) teams are growing like crazy, and there are more jobs in cybersecurity than qualified candidates. The challenge for organizations is...

Read More

Insights into User Entity Behavior Analytics (UEBA)

User Behavior Analytics or UBA was and still is the term for describing searching for patterns of usage that indicate unusual computing activities — regardless of whether it’s coming from...

Read More

Permission Propagation: Info and Tips

Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all...

Read More

We Know About Your Company’s Data: OSINT Lessons for C-Levels

 I’ve been on a mission the last few months to bring  basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.