-
Data SecurityNov 17, 2020
Netwalker Ransomware Guide: Everything You Need to Know
Ransomware has been on the rise. The Netwalker ransomware has begun a widespread attack campaign, and everyone should know how to defend themselves
Nathan Coppinger
7 min read
-
Data SecurityNov 16, 2020
The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files
Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...
Rachel Hunt
1 min read
-
Data SecurityNov 13, 2020
Finding Data Owners with Varonis
Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.
Michael Buckbee
4 min read
-
Data SecurityNov 11, 2020
What is an Incident Response Plan and How to Create One
We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.
Neil Fox
10 min read
-
Oct 26, 2020
Polyrize Acquisition
I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.
Yaki Faitelson
1 min read
-
Data SecurityOct 23, 2020
Watch: Varonis ReConnect!
Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...
Rachel Hunt
1 min read
-
Data SecurityOct 19, 2020
What is DNS Tunneling? A Detection Guide
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Michael Buckbee
4 min read
-
Data Security PowerShellSep 28, 2020
How Varonis Helps Stop Emotet
Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Rob Sobers
6 min read
-
Data SecuritySep 28, 2020
Data Privacy Guide: Definitions, Explanations and Legislation
Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.
Michael Buckbee
13 min read
-
Threat ResearchSep 25, 2020
Exploiting BGInfo to Infiltrate a Corporate Network
This post details how a clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi), bypass email security, and execute code remotely.
Dolev Taler
3 min read
-
Data SecuritySep 24, 2020
Data Migration Strategy Guide: Best Practices for Success and Security
Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.
Rob Sobers
7 min read
-
Active DirectorySep 21, 2020
How to Use John the Ripper: Tips and Tutorials
John the Ripper is a password-cracking tool that you should know about. Read on to learn more about this standard pentesting and hacking program.
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital