-
Data Security Security Bulletins
Mar 29, 2021
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
Rachel Hunt
1 min read
-
Active Directory Data Security
Mar 25, 2021
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
Neeraj Kumar
9 min read
-
Data Security
Mar 25, 2021
What is Data Integrity and How Can You Maintain it?
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
Michael Buckbee
4 min read
-
Data Security
Mar 25, 2021
What is Data Classification? Guidelines and Process
Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2021
How to Use Netcat Commands: Examples and Cheat Sheets
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Michael Buckbee
7 min read
-
Data Security
Mar 24, 2021
Addressing New Federal IT Work From Home Risks
This federal IT working from home guide will cover the risks involved and potential solutions.
David Harrington
5 min read
-
Data Security
Mar 23, 2021
Stack Memory: An Overview (Part 3)
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
Neil Fox
9 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
Neil Fox
6 min read
-
Data Security
Mar 22, 2021
ReConnect - Ways Attackers Sidestep Your Endpoints
One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...
Kilian Englert
1 min read
-
PowerShell
Mar 19, 2021
PowerShell Variable Scope Guide: Using Scope in Scripts and Modules
PowerShell variable scopes can cause confusion in writing scripts and functions. This post will cover PowerShell scopes in relation to scripts and modules.
Jeff Brown
5 min read
-
Threat Research
Mar 18, 2021
Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign
Our team has recently led several high-profile investigations of attacks attributed to an up-and-coming cybercrime group, Darkside ransomware
Snir Ben Shimol
7 min read
-
Data Security
Mar 18, 2021
How APTs Use Reverse Proxies to Nmap Internal Networks
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
Tokyoneon
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital