Latest articles
What Does it Take to Be an Ethical Hacker?
Jun 07, 2018
A white hat hacker, or an ethical hacker, works with agencies and organizations to discover network vulnerabilities and security flaws. Learn what it takes to make hacking your profession with our guide!
The Anatomy of a Phishing Email
May 08, 2018
Have you been hooked by a phishing email? We’ve broken out the most common components of a phishing email. Check out our full guide to test your knowledge!
🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know
Jun 27, 2017
On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed...
Reality Leah Winner and the Age of Insider Threats
Jun 06, 2017
Prosecutors allege that 25-year-old federal contractor Reality Leah Winner printed a top-secret NSA document detailing the ongoing investigation into Russian election hacking last November and mailed it to The Intercept....
What is a Data Security Portfolio?
Apr 12, 2017
A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools to reduce risk and prevent threats.
21 Free Tools Every SysAdmin Should Know
Jul 27, 2016
Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...
The Difference Between Active Directory and LDAP
Jul 13, 2016
A quick, plain-English explanation. Active Directory is a directory service made by Microsoft, and LDAP is how you speak to it.
Football player hacked live during NFL draft
Apr 29, 2016
Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from...
3 Deadly File Permissions Mistakes
Jul 08, 2014
Scarily, in most organizations people have access to much more information than they need in order to do their jobs. With file permissions, it’s easy to mess things up and...
How to Configure Varonis and EMC Isilon
Apr 21, 2014
Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc. Varonis is the perfect fit. With our...
CIFS vs SMB: What's the Difference?
Feb 14, 2014
CIFS, SMB, Samba, and NFS are technolgies used to network client and server systems. Learn the difference between them and which to use when.
8 Things to Look for in File Auditing Software
Oct 03, 2013
Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.
Try Varonis free.
Deploys in minutes.