-
Data Security
Nov 11, 2020
What is an Incident Response Plan and How to Create One
We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.
Neil Fox
10 min read
-
Data Security
Oct 23, 2020
Watch: Varonis ReConnect!
Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...
Rachel Hunt
1 min read
-
Data Security
Oct 19, 2020
What is DNS Tunneling? A Detection Guide
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Michael Buckbee
4 min read
-
Data Security PowerShell Security Bulletins
Sep 28, 2020
How Varonis Helps Stop Emotet
Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Rob Sobers
6 min read
-
Data Security
Sep 28, 2020
Data Privacy Guide: Definitions, Explanations and Legislation
Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.
Michael Buckbee
13 min read
-
Data Security
Sep 24, 2020
Data Migration Strategy Guide: Best Practices for Success and Security
Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.
Rob Sobers
7 min read
-
Data Security
Sep 08, 2020
Government Hacking Exploits, Examples and Prevention Tips
In this guide, we’ll explore how governments launch attacks, the different government hacking exploits and how you can defend yourself.
Rob Sobers
10 min read
-
Data Security
Sep 02, 2020
We Know About Your Company's Data: OSINT Lessons for C-Levels
I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...
Michael Buckbee
6 min read
-
Data Security
Aug 20, 2020
Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant
Phishing remains one of the most successful ways to infiltrate an organization. We’ve seen a massive amount of malware infections stemming from users opening infected attachments or clicking links that...
Eric Saraga
5 min read
-
Data Security
Aug 12, 2020
Varonis eBook: WMI Events and Insider Surveillance
If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...
Michael Buckbee
1 min read
-
Data Security
Aug 12, 2020
The No Hassle Guide to Event Query Language (EQL) for Threat Hunting
Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...
Michael Buckbee
11 min read
-
Data Security
Aug 10, 2020
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
Michael Buckbee
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital