Latest articles
Windows PowerShell vs. CMD: What's The Difference?
May 14, 2020
PowerShell is Microsoft’s updated shell that replaced the previous command prompt (CMD). Learn how to take advantage of cmdlets, piping, and third-party extensions.
Windows PowerShell Scripting Tutorial For Beginners
May 14, 2020
New to PowerShell scripting? Explore these scripting tutorials to learn to write and execute basic scripts, PowerShell cmdlets, aliases, pipes and more.
GDPR Requirements in Plain English
May 14, 2020
You just want to answer the question: “What do I need to do for GDPR?” Maybe you've worked your way through a few online quizzes to test for GDPR readiness or skimmed an article that made some vague suggestions. Learn the GDPR requirements.
24 Essential Penetration Testing Tools in 2020
May 13, 2020
A collection of the top penetration testing tools along with their best uses and supported platforms to help you find the pentesting tool you need.
The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA
May 05, 2020
Achieving compliance with HIPAA, PCI, GDPR, and CCPA regulations in your Azure system can be complex. In this guide, we’ll show you how.
Is Microsoft Office 365 HIPAA Compliant?
Apr 30, 2020
Microsoft Office 365 is growing in popularity, but it can present some challenges to HIPAA compliance. Read on to learn more about Office 365 HIPAA compliance
What is PGP Encryption and How Does It Work?
Apr 06, 2020
PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it
What is Fileless Malware? PowerShell Exploited
Apr 01, 2020
Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.
Top 5 Remote Work Security Threats
Apr 01, 2020
COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.
Active Directory Users and Computers (ADUC): Installation and Uses
Mar 29, 2020
Active Directory Users and Computers (ADUC) is a MMC snap-in you can use to manage Active Directory. Read on for more details, use cases, and caveats.
Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses
Mar 29, 2020
It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...
CryptoLocker: Everything You Need to Know
Mar 29, 2020
CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”
Try Varonis free.
Deploys in minutes.