-
Data SecurityNov 11, 2020
What is an Incident Response Plan and How to Create One
We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.
Neil Fox
10 min read
-
Oct 26, 2020
Polyrize Acquisition
I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.
Yaki Faitelson
1 min read
-
Data SecurityOct 23, 2020
Watch: Varonis ReConnect!
Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...
Rachel Hunt
1 min read
-
Data SecurityOct 19, 2020
What is DNS Tunneling? A Detection Guide
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Michael Buckbee
4 min read
-
Data Security PowerShellSep 28, 2020
How Varonis Helps Stop Emotet
Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Rob Sobers
6 min read
-
Data SecuritySep 28, 2020
Data Privacy Guide: Definitions, Explanations and Legislation
Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.
Michael Buckbee
13 min read
-
Threat ResearchSep 25, 2020
Exploiting BGInfo to Infiltrate a Corporate Network
This post details how a clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi), bypass email security, and execute code remotely.
Dolev Taler
3 min read
-
Data SecuritySep 24, 2020
Data Migration Strategy Guide: Best Practices for Success and Security
Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.
Rob Sobers
7 min read
-
Active DirectorySep 21, 2020
How to Use John the Ripper: Tips and Tutorials
John the Ripper is a password-cracking tool that you should know about. Read on to learn more about this standard pentesting and hacking program.
Michael Buckbee
3 min read
-
Data SecuritySep 08, 2020
Government Hacking Exploits, Examples and Prevention Tips
In this guide, we’ll explore how governments launch attacks, the different government hacking exploits and how you can defend yourself.
Rob Sobers
10 min read
-
Data SecuritySep 02, 2020
We Know About Your Company's Data: OSINT Lessons for C-Levels
I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...
Michael Buckbee
6 min read
-
Active DirectoryAug 21, 2020
What is Azure Active Directory? A Complete Overview
Azure Active Directory is a new way to manage users in the cloud. Read on to learn some details and some how-tos as you migrate to Azure AD.
Michael Buckbee
8 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital