-
Data Security
Apr 27, 2021
ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks
ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…
Robert Grimmick
8 min read
-
Data Security
Apr 26, 2021
What is C2? Command and Control Infrastructure Explained
A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence…
Robert Grimmick
7 min read
-
Data Security
Apr 23, 2021
Permission Propagation: Info and Tips
It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.
Brian Vecci
4 min read
-
Data Security
Apr 07, 2021
How Varonis Limits Organization-Wide Exposure
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Michael Buckbee
6 min read
-
Data Security
Apr 01, 2021
Endpoint Detection and Response: All You Need to Know About EDR Security
This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.
Robert Grimmick
6 min read
-
Data Security
Apr 01, 2021
How to Create and Manage the Azure Network Watcher Resource
The Azure Network Watcher comes with great diagnostic and monitoring tools. Learn more about how to create a Network Watcher and manage its components.
Jeff Brown
6 min read
-
Data Security
Apr 01, 2021
March 2021 Malware Trends Report
This is a monthly report from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples.
Ben Zion Lavi
6 min read
-
Data Security Security Bulletins
Mar 29, 2021
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
Rachel Hunt
1 min read
-
Active Directory Data Security
Mar 25, 2021
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
Neeraj Kumar
9 min read
-
Data Security
Mar 25, 2021
What is Data Integrity and How Can You Maintain it?
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
Michael Buckbee
4 min read
-
Data Security
Mar 25, 2021
What is Data Classification? Guidelines and Process
Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2021
How to Use Netcat Commands: Examples and Cheat Sheets
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Michael Buckbee
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital