-
Data Security
Jun 11, 2021
Azure Automation using PowerShell Runbooks
Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses? There could also be instances where you would want to automate the process of updating and patching the virtual machines in Azure in an IaaS deployment and also maintain its desired state configuration. Well, Azure Automation is the answer for you.
Neeraj Kumar
12 min read
-
Jun 09, 2021
Government Community Cloud: Primer on GCC High, GCC and DOD
Data security is paramount for federal agencies and contractors. This is especially true when it comes to doing business in the cloud. This is why many government teams utilize Government Community Cloud (GCC), a highly secure version of Office 365 built by Microsoft specifically for government entities, vendors, and contractors within the federal ecosystem.
David Harrington
7 min read
-
Data Security
Jun 07, 2021
Cybersecurity Threats Resource Center
Cybersecurity threats are constantly evolving and knowing how to protect and the latest threat facing your organization is an ongoing battle. Your security department should stay on top of any security research and adapt and make sure it has the defenses, tools, solutions, products, and strategy it needs to keep your organization safe.
Josue Ledesma
6 min read
-
Data Security
Jun 02, 2021
Process Hacker: Advanced Task Manager Overview
Process Hacker is a great tool for monitoring and investigating processes created by a piece of malware. It is a popular malware analysis tool amongst security professionals as it can extract a wealth of information from processes that are running on a device.
Neil Fox
5 min read
-
Data Security
May 26, 2021
Cuckoo Sandbox Overview
A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware.
Neil Fox
7 min read
-
Data Security
May 26, 2021
The Dawn Of The Four-Minute Cyberattack: Four Steps To Protect Your Company
On May 6, 1954, British athlete Roger Bannister stunned the world when he ran the first sub-four-minute mile. Bannister was the first but certainly would not be the last elite runner to break that record once thought to be impossible.
Yaki Faitelson
4 min read
-
Data Security
May 25, 2021
What is Privileged Access Management (PAM) and Why It’s Important to Your Organization
Privileged Access Management, or PAM, is one of the most effective processes and preventative systems available to organizations who want to reduce the risk their employees, partners, vendors, systems, and third parties pose to them.
Josue Ledesma
4 min read
-
Data Security Security Bulletins
May 24, 2021
April 2021 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
5 min read
-
Data Security
May 21, 2021
How to Analyze Malware with x64dbg
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we have learned so far to demonstrate some techniques that can be used when reverse engineering a piece of malware.
Neil Fox
6 min read
-
PowerShell
May 17, 2021
Git Branching and Merging: A Step-By-Step Guide
In previous articles, you learned “How to Revert a Commit in Git” (a PowerShell Git tutorial) and “How to Merge in Git: Remote and Local Git Repositories Tutorial.” You can also use Git to create branches in your project. Git branching allows multiple developers to work on a project by modifying the working codebase.
Jeff Brown
6 min read
-
Data Security
May 17, 2021
Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS
Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Nathan Coppinger
2 min read
-
Data Security Security Bulletins
May 17, 2021
YARA Rules Guide: Learning this Malware Research Tool
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
Neil Fox
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital