Blog

Data Security

Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS

Nathan Coppinger

Nathan Coppinger

Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and…

YARA Rules Guide: Learning this Malware Research Tool

Neil Fox

Neil Fox

YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.

How to Use Azure Sentinel for Security Analytics and Threat Intelligence

Neeraj Kumar

Neeraj Kumar

Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the…

What is an SMB Port + Ports 445 and 139 Explained

Michael Buckbee

Michael Buckbee

An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.

5 Data Governance Reports for Data Owners

Michael Buckbee

Michael Buckbee

This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...

ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks

Robert Grimmick

Robert Grimmick

ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…

What is C2? Command and Control Infrastructure Explained

Robert Grimmick

Robert Grimmick

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence…

Permission Propagation: Info and Tips

Brian Vecci

Brian Vecci

It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.

How Varonis Limits Organization-Wide Exposure

Michael Buckbee

Michael Buckbee

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential

Josue Ledesma

Josue Ledesma

Learn how to spot supply chain risks, attacks, and how to properly defend against them with an effective supply chain risk management strategy.

Using Salesforce Analytics for GDPR Compliance

Renganathan Padmanabhan

Renganathan Padmanabhan

GDPR compliance can be stressful. This guide shows you how to use Salesforce Analytics to comply with GDPR regulations by walking through common use cases.

Endpoint Detection and Response: All You Need to Know About EDR Security

Robert Grimmick

Robert Grimmick

This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.