Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Jun 17, 2020
Windows Defender Turned Off by Group Policy [Solved]
Windows Defender is a common AV solution, and attackers know how to work-around it. Learn how to turn Defender back on with this easy tutorial.
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
PowerShell for Pentesters: Scripts, Examples and Tips
This PowerShell for Pentesters' guide covers running commands, coding, tutorials and examples as well as the benefits of pentesting with PowerShell.
Michael Buckbee
5 min read
-
Data Security
Jun 17, 2020
Add Varonis to IAM for Better Access Governance
Managing permissions is a colossal job fraught with peril, and over-permissive folders are the bane of InfoSec and a hacker’s delight. Many organizations employ IAM (Identity Access Management) to help...
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
What is CASB? All About Cloud Access Security Brokers
Cloud Access Security Brokers (CASBs) are a great cybersecurity tool. Read on to learn about CASBs work, the solutions they offer and how to choose one.
Michael Buckbee
4 min read
-
Data Security
Jun 17, 2020
Cerber Ransomware: What You Need to Know
Cerber ransomware is a ransomware-as-a-service (RaaS) application that attacks your files by encrypting your important documents and database files. Learn how to protect your files from and keep your data safe.
Michael Buckbee
2 min read
-
Data Security Security Bulletins
Jun 17, 2020
Capital One's Cloud Breach & Why Data-Centric Security Matters
Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...
Rachel Hunt
1 min read
-
Data Security
Jun 17, 2020
What is UEBA? Complete Guide to User and Entity Behavior Analytics
UEBA extends User Behavior Analytics to cover entities. In this guide, we’ll show you how to use UEBA, and how it can improve your cybersecurity
Michael Buckbee
13 min read
-
Data Security
Jun 16, 2020
Sysmon Threat Analysis Guide
In my various pentesting experiments, I’ll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for...
Michael Buckbee
19 min read
-
Data Security
Jun 15, 2020
What is SIEM? A Beginner’s Guide
Learn about Security Information and Event Management (SIEM), what it is, how it works, and how SIEM solutions can help your business.
Michael Buckbee
5 min read
-
Data Security
Jun 15, 2020
What is DNS TTL + Best Practices
This article covers the topic of DNS TTL (time to live), best practices all aspects surrounding implementation.
Michael Buckbee
9 min read
-
Data Security
Jun 03, 2020
Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips
Microsoft Office 365 adds a layer of complexity to your data security strategy — learn how to protect data and improve collaboration in your organization.
Michael Buckbee
8 min read
-
Privacy & Compliance
May 29, 2020
Cybersecurity Maturity Model Certification (CMMC): A Contractor's Survival Guide
Cybersecurity Maturity Model Certification (CMMC) is a standard for DoD contractors’ cybersecurity. We’ll cover what it is and how to achieve compliance.
Justin McErlean
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital