Data Security
How to Use Ghidra to Reverse Engineer Malware
Mar 21, 2022
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
What Is a Botnet? Definition and Prevention
Mar 18, 2022
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
Common Types of Malware
Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.
Identify and Investigate Business Email Compromise (BEC) Scams
Feb 10, 2022
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.
What is an APT?: Advanced Persistent Threat Overview
Dec 08, 2021
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
What is a Brute Force Attack? Definition
Dec 08, 2021
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.
Defend Against Ransomware with the NIST Ransomware Profile
Dec 01, 2021
Learn about the NIST ransomware profile and how it can help defend against ransomware with Varonis.
How to Monitor Network Traffic: Effective Steps & Tips
Nov 18, 2021
In this article, you will learn how to monitor network traffic using different tools and methods.
What is Role-Based Access Control (RBAC)?
Nov 17, 2021
Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we'll explain what RBAC is, and how to implement it.
What is a Security Operations Center (SOC)?
Nov 17, 2021
What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.
INVEST in America Act: Billion-Dollar Funding for Cybersecurity
Nov 16, 2021
The INVEST in America Act provides nearly two billion dollars in funding to enhance the nation's cybersecurity. Who should care? State, local, and tribal governments. $1 billion in funding over...
Cloud Applications Put Your Data At Risk - Here's How To Regain Control
Nov 05, 2021
Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...
Try Varonis free.
Deploys in minutes.