Latest articles
How to Use Netcat Commands: Examples and Cheat Sheets
Mar 25, 2021
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Detecting Honeypot Access With Varonis
Mar 10, 2021
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
Group Policy Editor Guide: Access Options and How to Use
Feb 19, 2021
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Risk Management Framework (RMF): An Overview
Jan 29, 2021
The Risk Management Framework is a set of criteria for securing US Government IT Systems. In this guide, we’ll explain the RMF and how to implement it.
What is DNS, How it Works + Vulnerabilities
Jan 29, 2021
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
Jan 29, 2021
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
5 Priorities for the CISO Budget In 2021
Dec 22, 2020
Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.
What is a Port Scanner and How Does it Work?
Nov 23, 2020
Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.
What is Role-Based Access Control (RBAC)?
Nov 23, 2020
Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we’ll explain what RBAC is, and how to implement it.
Finding Data Owners with Varonis
Nov 13, 2020
Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.
The Saga of Trickbot
Oct 23, 2020
This is the never-ending story of Trickbot ransomware: the threat, the "takedown," the reboot, the hero. Is Trickbot a threat to democracy? Read on.
What is DNS Tunneling? A Detection Guide
Oct 19, 2020
Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them
Try Varonis free.
Deploys in minutes.