-
Active Directory Data Security
Dec 17, 2024
Why Identity is the Biggest Blind Spot in Data Security
Modern Data Security Platforms (DSP) must integrate identity risk and context for effective posture management, threat detection, and response.
Shawn Hays
3 min read
-
Active Directory Microsoft 365 Threat Research
Nov 10, 2024
New Organizational Messages Feature in Microsoft 365 a Potential Risk
The new organizational messages feature for Microsoft 365 enhances how IT and security teams communicate with users at scale, but also generates risks.
Shawn Hays
3 min read
-
Active Directory
Oct 05, 2022
Azure Managed Identities: Definition, Types, Benefits + Demonstration
Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.
Neeraj Kumar
7 min read
-
Active Directory
Jun 15, 2022
Group Policy Objects (GPOs): How They Work & Configuration Steps
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
David Harrington
6 min read
-
Active Directory
Apr 04, 2022
12 Group Policy Best Practices: Settings and Tips for Admins
Group Policy configures settings, behavior, and privileges for user and computers. In this article, you’ll learn best practices when working with Group Policy.
Jeff Brown
5 min read
-
Active Directory
Aug 25, 2021
Securing Azure Blob Storage: Set-Up Guide
Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been…
Jeff Brown
7 min read
-
Active Directory
Jun 30, 2021
Understanding Azure DevOps and Building CI/CD Pipeline
Are you interested in learning about the tool that helps to automate and manage the complete software development lifecycle? Well, Azure DevOps is the answer for you, but before we…
Neeraj Kumar
8 min read
-
Active Directory
Jun 28, 2021
Exploring ARM Templates: Azure Resource Manager Tutorial
Are you tired of clicking around the Azure portal creating virtual machines, storage accounts, and app services? Do you need a reliable method of creating the same environment multiple times?…
Jeff Brown
11 min read
-
Active Directory Data Security
Jun 14, 2021
How to Create an Azure Virtual Network
Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.
Jeff Brown
7 min read
-
Active Directory Data Security
Mar 25, 2021
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
Neeraj Kumar
9 min read
-
Active Directory Data Security
Feb 19, 2021
Group Policy Editor Guide: Access Options and How to Use
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Michael Buckbee
4 min read
-
Active Directory Data Security PowerShell
Jan 29, 2021
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
Michael Buckbee
13 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital