Blog

Data Security

How to Create and Manage the Azure Network Watcher Resource

Jeff Brown

Jeff Brown

The Azure Network Watcher comes with great diagnostic and monitoring tools. Learn more about how to create a Network Watcher and manage its components.

Docker vs. Kubernetes

Taurai Mutimutema

Taurai Mutimutema

Docker vs Kubernetes: Learn about Kubernetes and Docker as you discover which technology to use and why using it for each case is better. Should you use both?

March 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This is a monthly report from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples.

The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.

How to Use Azure Private Endpoints to Restrict Public Access to WebApps

Neeraj Kumar

Neeraj Kumar

Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.

What is Data Integrity and How Can You Maintain it?

Michael Buckbee

Michael Buckbee

Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here. 

What is Data Classification? Guidelines and Process

Michael Buckbee

Michael Buckbee

Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.

How to Use Netcat Commands: Examples and Cheat Sheets

Michael Buckbee

Michael Buckbee

Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.

Addressing New Federal IT Work From Home Risks

David Harrington

David Harrington

This federal IT working from home guide will cover the risks involved and potential solutions.

Stack Memory: An Overview (Part 3)

Neil Fox

Neil Fox

An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.

How to Use Autoruns to Detect and Remove Malware on Windows

Neil Fox

Neil Fox

This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.

ReConnect - Ways Attackers Sidestep Your Endpoints

Kilian Englert

Kilian Englert

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.