-
Data SecurityAug 20, 2020
Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant
Phishing remains one of the most successful ways to infiltrate an organization. We’ve seen a massive amount of malware infections stemming from users opening infected attachments or clicking links that...
Eric Saraga
5 min read
-
Privacy & ComplianceAug 17, 2020
California Privacy Rights Act (CPRA): Your Up-To-Date Guide to CCPA 2.0
The California Privacy Rights Act (CPRA), an extension of the CCPA, is expected to pass in Nov 2020 — we’ll explain what the CPRA means for your business.
David Harrington
6 min read
-
Data SecurityAug 12, 2020
Varonis eBook: WMI Events and Insider Surveillance
If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...
Michael Buckbee
1 min read
-
Threat ResearchAug 12, 2020
A Queen’s Ransom: Varonis Uncovers Fast-Spreading “SaveTheQueen” Ransomware
A new strain of ransomware encrypts files and appends them with the extension, “.SaveTheQueen,” and propagates using the SYSVOL share on Active Directory Domain Controllers. Our customers encountered this malware...
Ben Zion Lavi
4 min read
-
Data SecurityAug 12, 2020
The No Hassle Guide to Event Query Language (EQL) for Threat Hunting
Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...
Michael Buckbee
11 min read
-
Data SecurityAug 10, 2020
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
Michael Buckbee
7 min read
-
Data SecurityJul 29, 2020
Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software
Varonis was rated 4.6 out of 5 stars in Gartner Peer Insights File Analysis Software, based on 211 reviews as of 23 July 2020. Download the full report.
Avia Navickas
2 min read
-
Active DirectoryJul 28, 2020
Active Directory Resource Center
Active Directory is the basis of many enterprise networks. Learn some of the basics about AD in this guide.
Michael Buckbee
8 min read
-
Data SecurityJul 28, 2020
DNS Security Guide
DNS security should be considered an essential part of any business's security plan. Our goal in this piece is to help provide information to best inform you of all options around securing your DNS.
Michael Buckbee
5 min read
-
Active Directory Data SecurityJul 14, 2020
Active Directory Account Lockout: Tools and Diagnosis Guide
AD Account Lockouts are perhaps the biggest source of frustration for IT admins. In this guide, we’ll explain how they happen, and how to prevent them.
Michael Buckbee
6 min read
-
Jun 24, 2020
Getting the Most Out of Data Transport Engine
If you don’t need it, get rid of it. If it’s sensitive, make sure sure it’s in the right place, and only accessible to those who need it. Old files...
Brian Vecci
3 min read
-
Data SecurityJun 23, 2020
Malware Protection: Basics and Best Practices
Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.
Michael Buckbee
12 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital