-
Data SecurityApr 06, 2020
What is PGP Encryption and How Does It Work?
PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it
Michael Buckbee
9 min read
-
Data SecurityApr 06, 2020
COVID-19 THREAT UPDATE #4
Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...
Kilian Englert
1 min read
-
Data SecurityApr 01, 2020
What is Fileless Malware? PowerShell Exploited
Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.
Michael Buckbee
8 min read
-
Data SecurityMar 31, 2020
COVID-19 Threat Update #3
If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...
Kilian Englert
1 min read
-
Active DirectoryMar 29, 2020
Active Directory Users and Computers (ADUC): Installation and Uses
Active Directory Users and Computers (ADUC) is a MMC snap-in you can use to manage Active Directory. Read on for more details, use cases, and caveats.
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses
It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...
Michael Buckbee
5 min read
-
Data SecurityMar 29, 2020
CryptoLocker: Everything You Need to Know
CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”
Michael Buckbee
5 min read
-
Privacy & ComplianceMar 29, 2020
How Varonis Helps With ITAR Compliance
International Traffic in Arms Regulations (ITAR) mandates that access to physical materials or technical data related to defense and military technologies is restricted to US citizens only. According to the US...
Jesse Rosenbaum
2 min read
-
Data SecurityMar 29, 2020
Announcing Varonis Edge – to the Perimeter and Beyond
Email, web, and brute force attacks are the primary ways that malware gets through your defenses. The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails. Remote Access Trojans?...
Michael Buckbee
1 min read
-
Data SecurityMar 29, 2020
How Varonis Levels Up Your Incident Response
Varonis arms your incident response team with expert playbooks on how to respond to common alerts, as well as a free IR service to help you when you need it most.
Michael Buckbee
3 min read
-
Data SecurityMar 29, 2020
Kerberos Attack: Silver Ticket Edition
With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty...
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
12 TED Talks That Will Change the Way You Look at Business Cybersecurity
The world of business cybersecurity is always changing. Stay on top of trends and ahead of threats with our 12 favorite cybersecurity TED talks.
Rob Sobers
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital