- 
						
							 Privacy & Compliance Privacy & ComplianceJan 29, 2021 What is the Risk Management Framework (RMF)?The Risk Management Framework (RMF) outlines how U.S. government IT systems must be secured, monitored, and governed to reduce cyber risk.   Michael Buckbee 6 min read 
- 
						
							 Data Security Data SecurityJan 29, 2021 What is DNS, How it Works + VulnerabilitiesWhat is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.   Michael Buckbee 9 min read 
- 
						
							 Data Security Data SecurityJan 29, 2021 Hacking Wi-Fi With the ESP8266Hack, monitor, and defend networks using the ESP8266 microcontroller and these Arduino based projects.   Kody Kinzie 4 min read 
- 
						
							 Active Directory Data Security PowerShell Active Directory Data Security PowerShellJan 29, 2021 Windows Management Instrumentation (WMI) Guide: Understanding WMI AttacksWMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.   Michael Buckbee 13 min read 
- 
						
							 Data Security Data SecurityJan 29, 2021 What Is Cryptojacking? Prevention and Detection TipsLearn how cryptocurrency, cryptomining and cryptojacking work — also included are tips to prevent and detect cryptojacking before it's too late   Rob Sobers 8 min read 
- 
						
							 Data Security Data SecurityJan 28, 2021 IPv6 Security Guide: Do you Have a Blindspot?Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.   Robert Grimmick 7 min read 
- 
						
							 Data Security PowerShell Security Bulletins Data Security PowerShell Security BulletinsJan 27, 2021 Top 12 Malware Analysis Tools and Their FeaturesExplore 12 powerful malware analysis tools including traditional and AI-powered options that help security teams detect, dissect, and understand modern threats.   Neil Fox 9 min read 
- 
						
							 Data Security Security Bulletins Data Security Security BulletinsJan 27, 2021 Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk LowHow do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...   Kilian Englert 1 min read 
- 
						
							 Data Security Security Bulletins Data Security Security BulletinsJan 27, 2021 What is x64dbg + How to Use ItLearn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.   Neil Fox 5 min read 
- 
						
							 Data Security Data SecurityJan 27, 2021 How Hackers Spoof DNS Requests With DNS Cache PoisoningAn overview of what DNS spoofing and DNS cache poisoning really are and how to protect your organization against them, plus FAQs answers.   Michael Raymond 9 min read 
- 
						
							 Data Security Data SecurityJan 19, 2021 Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365Varonis version 8.5 is here. Discover organization-wide exposure and learn how to combat insider risk in Microsoft 365 with this new update.   Nathan Coppinger 4 min read 
- 
						
							 Data Security Data SecurityJan 15, 2021 Exfiltrate NTLM Hashes with PowerShell ProfilesLearn how to exfiltrate NTLM hashes using PowerShell, Mimikatz, Hashcat and other techniques through real code examples, gif walkthroughs and screenshots.   Tokyoneon 10 min read 
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital
 
           
                  .png) 
                -1.png)