Blog

Data Security

SIEM Tools: 9 Tips for a Successful Deployment

Robert Grimmick

Robert Grimmick

Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…

Azure Bicep: Getting Started and How-To Guide

Jeff Brown

Jeff Brown

Learn more about Azure Bicep, Microsoft’s new infrastructure as a code language for deploying Azure resources. Contact Varonis today for more information.

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Robert Grimmick

Robert Grimmick

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…

How to Create an Azure Virtual Network

Jeff Brown

Jeff Brown

Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.

Azure Automation using PowerShell Runbooks

Neeraj Kumar

Neeraj Kumar

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Cybersecurity Threats Resource Center

Josue Ledesma

Josue Ledesma

Learn the cybersecurity threats facing your organization today and find out what tools, processes, and systems can help protect you from them.

Process Hacker: Advanced Task Manager Overview

Neil Fox

Neil Fox

This article is an overview of the tool Process Hacker. This is a popular tool amongst security professionals when analyzing malware as it will display real-time activity of processes and provide a wealth of technical information on how a particular process is behaving.

Cuckoo Sandbox Overview

Neil Fox

Neil Fox

A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware. Imagine, it’s 2 am in the Security Operations Center (SOC) and an alert has triggered…

The Dawn Of The Four-Minute Cyberattack: Four Steps To Protect Your Company

Yaki Faitelson

Yaki Faitelson

Attack chains that were once only theoretical are now a reality. SolarWinds was the Roger Bannister of cyberattacks — now that we’ve had one breakthrough, we will have others.

What is Privileged Access Management (PAM) and Why It’s Important to Your Organization

Josue Ledesma

Josue Ledesma

Learn why privileged access management is a necessary component of your cybersecurity strategy that keeps your assets protected.

April 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…

How to Analyze Malware with x64dbg

Neil Fox

Neil Fox

This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we…

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.