Latest articles
How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests
Oct 07, 2020
Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...
Data Privacy Guide: Definitions, Explanations and Legislation
Sep 28, 2020
Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.
How to Use John the Ripper: Tips and Tutorials
Sep 21, 2020
John the Ripper is a password-cracking tool that you should know about. Read on to learn more about this standard pentesting and hacking program.
We Know About Your Company's Data: OSINT Lessons for C-Levels
Sep 02, 2020
I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...
What is Azure Active Directory? A Complete Overview
Aug 21, 2020
Azure Active Directory is a new way to manage users in the cloud. Read on to learn some details and some how-tos as you migrate to Azure AD.
Varonis eBook: WMI Events and Insider Surveillance
Aug 12, 2020
If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...
The No Hassle Guide to Event Query Language (EQL) for Threat Hunting
Aug 12, 2020
Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Aug 10, 2020
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
Active Directory Resource Center
Jul 28, 2020
Active Directory is the basis of many enterprise networks. Learn some of the basics about AD in this guide.
DNS Security Guide
Jul 28, 2020
DNS security should be considered an essential part of any business's security plan. Our goal in this piece is to help provide information to best inform you of all options around securing your DNS.
Active Directory Account Lockout: Tools and Diagnosis Guide
Jul 14, 2020
AD Account Lockouts are perhaps the biggest source of frustration for IT admins. In this guide, we’ll explain how they happen, and how to prevent them.
Malware Protection: Basics and Best Practices
Jun 23, 2020
Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.
Try Varonis free.
Deploys in minutes.