Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security Security Bulletins
May 17, 2021
YARA Rules Guide: Learning this Malware Research Tool
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
Neil Fox
7 min read
-
Data Security
May 11, 2021
How to Use Azure Sentinel for Security Analytics and Threat Intelligence
Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the…
Neeraj Kumar
9 min read
-
Data Security
May 07, 2021
What is an SMB Port + Ports 445 and 139 Explained
An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.
Michael Buckbee
2 min read
-
Data Security
Apr 27, 2021
5 Data Governance Reports for Data Owners
This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...
Michael Buckbee
3 min read
-
Data Security
Apr 27, 2021
ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks
ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…
Robert Grimmick
8 min read
-
Data Security
Apr 26, 2021
What is C2? Command and Control Infrastructure Explained
A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence…
Robert Grimmick
7 min read
-
Data Security
Apr 23, 2021
Permission Propagation: Info and Tips
It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.
Brian Vecci
4 min read
-
Data Security
Apr 07, 2021
How Varonis Limits Organization-Wide Exposure
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Michael Buckbee
6 min read
-
Data Security Privacy & Compliance
Apr 02, 2021
Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential
Learn how to spot supply chain risks, attacks, and how to properly defend against them with an effective supply chain risk management strategy.
Josue Ledesma
5 min read
-
Data Security Privacy & Compliance
Apr 01, 2021
Using Salesforce Analytics for GDPR Compliance
GDPR compliance can be stressful. This guide shows you how to use Salesforce Analytics to comply with GDPR regulations by walking through common use cases.
Renganathan Padmanabhan
4 min read
-
Data Security
Apr 01, 2021
Endpoint Detection and Response: All You Need to Know About EDR Security
This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.
Robert Grimmick
6 min read
-
Data Security
Apr 01, 2021
How to Create and Manage the Azure Network Watcher Resource
The Azure Network Watcher comes with great diagnostic and monitoring tools. Learn more about how to create a Network Watcher and manage its components.
Jeff Brown
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital