Latest articles
What is Identity Access Management?
Jun 17, 2020
Identity and Access Management is a critical function for enterprises to control and monitor in order to safeguard all their data, systems, and people
Active Directory Has a Privacy Problem
Jun 17, 2020
Attackers can manipulate Active Directory into giving up potentially sensitive data about users on your network.
Frequently Asked Questions (FAQ): GDPR and HR/Employee Data
Jun 17, 2020
As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...
AWS vs Azure vs Google: Cloud Services Comparison
Jun 17, 2020
This AWS vs Azure vs Google comparison evaluates the pros and cons of these public cloud providers including pricing, computing, storage and other features.
Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I
Jun 17, 2020
In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....
Endpoint Detection and Response (EDR): Everything You Need to Know
Jun 17, 2020
Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!
The Difference Between Data Governance and IT Governance
Jun 17, 2020
Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...
Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit
Jun 17, 2020
After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...
What is an Active Directory Forest?
Jun 17, 2020
An Active Directory forest is the top most logical container in an Active Directory configuration that contains domains, users, computers, and group policies.
Wyden's Consumer Data Protection Act: How to Be Compliant
Jun 17, 2020
Will 2019 be the year the US gets its own GDPR-like privacy law? Since my last post in this series, privacy legislation is becoming more certain to pass. Leaders from...
Understanding Security Analytics Platforms
Jun 17, 2020
I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...
Windows Defender Turned Off by Group Policy [Solved]
Jun 17, 2020
Windows Defender is a common AV solution, and attackers know how to work-around it. Learn how to turn Defender back on with this easy tutorial.
Try Varonis free.
Deploys in minutes.