-
Data SecurityMar 02, 2021
Attack lab: Spear Phishing with Google Drive Sharing
Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams
Nathan Coppinger
4 min read
-
Data Security PowerShellFeb 22, 2021
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
Kilian Englert
1 min read
-
Active Directory Data SecurityFeb 19, 2021
Group Policy Editor Guide: Access Options and How to Use
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Michael Buckbee
4 min read
-
PowerShellFeb 19, 2021
How to Revert a Commit in Git (PowerShell Git Tutorial)
This PowerShell tutorial shows how revert to a previous Git commit in a local repository — Git can be used locally without a remote repository.
Jeff Brown
4 min read
-
Privacy & ComplianceJan 29, 2021
What is the Risk Management Framework (RMF)?
The Risk Management Framework (RMF) outlines how U.S. government IT systems must be secured, monitored, and governed to reduce cyber risk.
Michael Buckbee
6 min read
-
Data SecurityJan 29, 2021
What is DNS, How it Works + Vulnerabilities
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Michael Buckbee
9 min read
-
Active Directory Data Security PowerShellJan 29, 2021
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
Michael Buckbee
13 min read
-
Data SecurityJan 29, 2021
What Is Cryptojacking? Prevention and Detection Tips
Learn how cryptocurrency, cryptomining and cryptojacking work — also included are tips to prevent and detect cryptojacking before it's too late
Rob Sobers
8 min read
-
Data SecurityJan 28, 2021
IPv6 Security Guide: Do you Have a Blindspot?
Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.
Robert Grimmick
7 min read
-
Data Security PowerShellJan 27, 2021
Top 11 Malware Analysis Tools and Their Features
Explore 11 powerful malware analysis tools including traditional and AI-powered options that help security teams detect, dissect, and understand modern threats.
Neil Fox
8 min read
-
Data SecurityJan 27, 2021
Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low
How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...
Kilian Englert
1 min read
-
Data SecurityJan 27, 2021
What is x64dbg + How to Use It
Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.
Neil Fox
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital