-
Data Security
Oct 23, 2020
Watch: Varonis ReConnect!
Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...
Rachel Hunt
1 min read
-
Data Security
Oct 19, 2020
What is DNS Tunneling? A Detection Guide
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Michael Buckbee
4 min read
-
Data Security PowerShell Security Bulletins
Sep 28, 2020
How Varonis Helps Stop Emotet
Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Rob Sobers
6 min read
-
Data Security
Sep 28, 2020
Data Privacy Guide: Definitions, Explanations and Legislation
Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.
Michael Buckbee
13 min read
-
Threat Research
Sep 25, 2020
Exploiting BGInfo to Infiltrate a Corporate Network
This post details how a clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi), bypass email security, and execute code remotely.
Dolev Taler
3 min read
-
Data Security
Sep 24, 2020
Data Migration Strategy Guide: Best Practices for Success and Security
Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.
Rob Sobers
7 min read
-
Active Directory
Sep 21, 2020
How to Use John the Ripper: Tips and Tutorials
John the Ripper is a password-cracking tool that you should know about. Read on to learn more about this standard pentesting and hacking program.
Michael Buckbee
3 min read
-
Data Security
Sep 08, 2020
Government Hacking Exploits, Examples and Prevention Tips
In this guide, we’ll explore how governments launch attacks, the different government hacking exploits and how you can defend yourself.
Rob Sobers
10 min read
-
Data Security
Sep 02, 2020
We Know About Your Company's Data: OSINT Lessons for C-Levels
I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...
Michael Buckbee
6 min read
-
Active Directory
Aug 21, 2020
What is Azure Active Directory? A Complete Overview
Azure Active Directory is a new way to manage users in the cloud. Read on to learn some details and some how-tos as you migrate to Azure AD.
Michael Buckbee
8 min read
-
Data Security
Aug 20, 2020
Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant
Phishing remains one of the most successful ways to infiltrate an organization. We’ve seen a massive amount of malware infections stemming from users opening infected attachments or clicking links that...
Eric Saraga
5 min read
-
Privacy & Compliance
Aug 17, 2020
California Privacy Rights Act (CPRA): Your Up-To-Date Guide to CCPA 2.0
The California Privacy Rights Act (CPRA), an extension of the CCPA, is expected to pass in Nov 2020 — we’ll explain what the CPRA means for your business.
David Harrington
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital