Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

How Varonis Levels Up Your Incident Response

It’s a good time to be in cybersecurity. Incident Response(IR) teams are growing like crazy, and there are more jobs in cybersecurity than qualified candidates. The challenge for organizations is...

Read More

Insights into User Entity Behavior Analytics (UEBA)

User Behavior Analytics or UBA was and still is the term for describing searching for patterns of usage that indicate unusual computing activities — regardless of whether it’s coming from...

Read More

Permission Propagation: Info and Tips

Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all...

Read More

We Know About Your Company’s Data: OSINT Lessons for C-Levels

 I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Read More

How to Investigate NTLM Brute Force Attacks

In this blog, we will describe the workflow the Varonis IR Team uses to investigate NTLM brute force attacks, which are a common type of attack they see in the...

Read More

PowerShell for Pentesters: Scripts, Examples and Tips

In case you haven’t noticed, we’ve been championing PowerShell as a pentesting tool in more than a few blog posts. One big reason to learn PowerShell and use it to...

Read More

2019 Data Risk Report Stats and Tips You Won’t Want to Miss

Each year, Varonis conducts thousands of data risk assessments for organizations that want a clearer picture of their security posture and develop a roadmap to reducing risk to sensitive data....

Read More

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

You may have heard that Microsoft changed their guidance on password expiration policies. On May 23, 2019, they released a blog post explaining their decisions. As cybersecurity experts already know,...

Read More

A Quick Dip into Event Query Language (EQL)

Did you ever have the urge to put together a few PowerShell scripts leveraging the Windows Management Interface (WMI) to create your own file security monitoring package? My advice: wait...

Read More

What is Zero Trust? A Security Model

Zero Trust is a security model developed by former Forrester analyst John Kindervag in 2010. Since then, Zero Trust has become one of the more popular frameworks in cybersecurity. Recent...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.