Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Sep 14, 2021
The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees
Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…
Rachel Hunt
1 min read
-
Active Directory
Aug 25, 2021
Securing Azure Blob Storage: Set-Up Guide
Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been…
Jeff Brown
7 min read
-
Aug 24, 2021
Azure CLI Overview: Setup, Comparison, and Integration Tips
The Azure CLI is a command-line tool for managing your Azure environment. This article covers the benefits of Azure CLI and how to get started using it!
Jeff Brown
7 min read
-
Cloud Security
Aug 24, 2021
Introduction to AWS DevOps: Skills + Tools You Need
Amazon Web Services has capabilities that help you accelerate Devops journey. In this article, we discuss the AWS tools, architecture and how they help organizations increase the ability to deliver and deploy applications at high velocity and better quality.
Meenakshi Kasi
8 min read
-
Data Security
Aug 18, 2021
How to Fix Broken Registry Items: Visual Guide and Solutions
Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.
Robert Grimmick
7 min read
-
Ransomware
Aug 16, 2021
What is Ransomware? Types and Definitions of Ransomware Attacks
Ransomware attacks can result in significant loss of data, system functionality, and financial resources. But exactly what is ransomware? Ransomware can take a variety of shapes and forms, not to...
David Harrington
7 min read
-
Data Security
Aug 16, 2021
Last Week in Ransomware: Week of August 16th
This week was a win with REvil and SynACK decryption keys being released, but also saw a rise in PrintNightmare use by ransomware gangs.
Michael Raymond
1 min read
-
Data Security
Aug 11, 2021
Think Your Data Is Secure? Three Questions You Need To Answer Right Now
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.
Yaki Faitelson
3 min read
-
Data Security
Aug 09, 2021
Understand and Implement Azure Monitor for Monitoring Workloads
You always want your business-critical production applications to run without issues or downtime. To achieve this you need to continuously analyze system logs, monitor your application and their dependent services…
Neeraj Kumar
7 min read
-
Data Security
Aug 09, 2021
Last Week in Ransomware: Week of August 9th
This week saw the rise of a new ransomware group called BlackMatter and demonstrated even ransomware groups should worry about disgruntled employees.
Michael Raymond
1 min read
-
Data Security
Aug 05, 2021
Packet Capture: What is it and What You Need to Know
Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.
Robert Grimmick
9 min read
-
Data Security
Aug 05, 2021
How to Investigate NTLM Brute Force Attacks
This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
Ed Lin
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital