-
Data Security
Aug 18, 2021
How to Fix Broken Registry Items: Visual Guide and Solutions
Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.
Robert Grimmick
7 min read
-
Data Security
Aug 16, 2021
Last Week in Ransomware: Week of August 16th
This week was a win with REvil and SynACK decryption keys being released, but also saw a rise in PrintNightmare use by ransomware gangs.
Michael Raymond
1 min read
-
Data Security
Aug 11, 2021
Think Your Data Is Secure? Three Questions You Need To Answer Right Now
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.
Yaki Faitelson
3 min read
-
Data Security
Aug 09, 2021
Understand and Implement Azure Monitor for Monitoring Workloads
You always want your business-critical production applications to run without issues or downtime. To achieve this you need to continuously analyze system logs, monitor your application and their dependent services…
Neeraj Kumar
7 min read
-
Data Security
Aug 09, 2021
Last Week in Ransomware: Week of August 9th
This week saw the rise of a new ransomware group called BlackMatter and demonstrated even ransomware groups should worry about disgruntled employees.
Michael Raymond
1 min read
-
Data Security
Aug 05, 2021
Packet Capture: What is it and What You Need to Know
Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.
Robert Grimmick
9 min read
-
Data Security
Aug 05, 2021
How to Investigate NTLM Brute Force Attacks
This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
Ed Lin
6 min read
-
Data Security
Aug 04, 2021
Your Comprehensive Guide to Salesforce Shield
Salesforce Shield provides an excellent suite of tools for Salesforce data security. This guide explains why it might be the right choice for your enterprise security needs.
Renganathan Padmanabhan
4 min read
-
Data Security
Aug 04, 2021
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Threat Modeling and How To Choose the Right Framework
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
Josue Ledesma
5 min read
-
Data Security
Jul 26, 2021
Last Week in Ransomware: Week of July 26th
This week REvil Ransomware had a universal decryption key appear out of thin air and the US has accused China of ProxyLogon.
Michael Raymond
1 min read
-
Data Security
Jul 20, 2021
What is a Brute Force Attack?
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital