-
Data Security Privacy & Compliance
Jun 17, 2020
Right to be Forgotten: Explained
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Michael Buckbee
5 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part V: More DDE and COM Scriplets
In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...
Michael Buckbee
4 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part I
When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...
Michael Buckbee
4 min read
-
Data Security Privacy & Compliance
Jun 17, 2020
How to Discover GDPR Data With Varonis
GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
What is Identity Access Management?
Identity and access management is establishing and managing the roles and access privileges of individual network users.
Daniel Miller
6 min read
-
Data Security
Jun 17, 2020
Is Your Company Prepared for a Cyber Attack?
Would your company survive a cyber attack? Use our flowchart to see if your business is prepared for cybersecurity threats.
Rob Sobers
1 min read
-
Data Security
Jun 17, 2020
Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I
In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....
Michael Buckbee
6 min read
-
Data Security
Jun 17, 2020
Endpoint Detection and Response (EDR): Everything You Need to Know
Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2020
The Difference Between Data Governance and IT Governance
Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit
After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...
Michael Buckbee
3 min read
-
Data Security
Jun 17, 2020
Data Breach Response Times: Trends and Tips
We've taken a deep dive to discover the trends between different data breaches, their response times, the effect of response duration and what you can do to keep your response time down.
Rob Sobers
10 min read
-
Active Directory Data Security
Jun 17, 2020
What is an Active Directory Forest?
An Active Directory forest is the top most logical container in an Active Directory configuration that contains domains, users, computers, and group policies.
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital