Blog

Data Security

How to Use Ghidra to Reverse Engineer Malware

Neil Fox

Neil Fox

An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.

What Is a Botnet? Definition and Prevention

Josue Ledesma

Josue Ledesma

Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.

Common Types of Malware

Neil Fox

Neil Fox

This piece covers the various types of malware that are available and their characteristics.

Identify and Investigate Business Email Compromise (BEC) Scams

Ed Lin

Ed Lin

In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

What is an APT?: Advanced Persistent Threat Overview

Josue Ledesma

Josue Ledesma

Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.

What is a Brute Force Attack? Definition

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.

Defend Against Ransomware with the NIST Ransomware Profile

Yumna Moazzam

Yumna Moazzam

Learn about the NIST ransomware profile and how it can help defend against ransomware with Varonis.

How to Monitor Network Traffic: Effective Steps & Tips

David Harrington

David Harrington

In this article, you will learn how to monitor network traffic using different tools and methods.

What is Role-Based Access Control (RBAC)?

Neeraj Kumar

Neeraj Kumar

Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we'll explain what RBAC is, and how to implement it.

What is a Security Operations Center (SOC)?

David Harrington

David Harrington

What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.

INVEST in America Act: Billion-Dollar Funding for Cybersecurity

Nathan Coppinger

Nathan Coppinger

The INVEST in America Act provides nearly two billion dollars in funding to enhance the nation's cybersecurity. Who should care? State, local, and tribal governments. $1 billion in funding over...

Cloud Applications Put Your Data At Risk - Here's How To Regain Control

Yaki Faitelson

Yaki Faitelson

Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.