Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot. Learn more

Blog

Data Security

Threat Update 44 – Ransomware Early Warning: DNS Recon

Kilian Englert

Kilian Englert

Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss what DNS is, how it works, and how attackers can “live off the land” to map out an organization’s network using a few command-line tools built into every OS.

ReConnect - Meet DatAdvantage Cloud

Kilian Englert

Kilian Englert

Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!

Last Week in Ransomware: Week of June 28th

Michael Raymond

Michael Raymond

Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....

SIEM Tools: 9 Tips for a Successful Deployment

Robert Grimmick

Robert Grimmick

Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…

Threat Update 43 – Ransomware Early Warning: Brute Force

Kilian Englert

Kilian Englert

With the proliferation of more sophisticated, human-operated ransomware, attackers can live inside an organization for days, weeks, or months - finding and exfiltrating data before making their presence known by detonating ransomware.

Last Week in Microsoft Azure: Week of June 21st

Jeff Brown

Jeff Brown

This week’s review covers a new Azure datacenter region, understanding virtual machine billing, and an event announcing the next version of Windows.

Azure Bicep: Getting Started and How-To Guide

Jeff Brown

Jeff Brown

Learn more about Azure Bicep, Microsoft’s new infrastructure as a code language for deploying Azure resources. Contact Varonis today for more information.

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Robert Grimmick

Robert Grimmick

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…

Last Week in Microsoft Azure: Week of June 14th

Jeff Brown

Jeff Brown

This week’s review covers a rebranding to Azure Virtual Desktop, moving resources into availability zones, and tutorials on new Azure Function capabilities.

How to Create an Azure Virtual Network

Jeff Brown

Jeff Brown

Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.

Azure Automation using PowerShell Runbooks

Neeraj Kumar

Neeraj Kumar

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Cybersecurity Threats Resource Center

Josue Ledesma

Josue Ledesma

Learn the cybersecurity threats facing your organization today and find out what tools, processes, and systems can help protect you from them.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.