Data Security
How to Create and Manage the Azure Network Watcher Resource
Apr 01, 2021
The Azure Network Watcher comes with great diagnostic and monitoring tools. Learn more about how to create a Network Watcher and manage its components.
Docker vs. Kubernetes
Apr 01, 2021
Docker vs Kubernetes: Learn about Kubernetes and Docker as you discover which technology to use and why using it for each case is better. Should you use both?
March 2021 Malware Trends Report
Apr 01, 2021
This is a monthly report from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples.
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
Mar 29, 2021
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Mar 25, 2021
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
What is Data Integrity and How Can You Maintain it?
Mar 25, 2021
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
What is Data Classification? Guidelines and Process
Mar 25, 2021
Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.
How to Use Netcat Commands: Examples and Cheat Sheets
Mar 25, 2021
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Addressing New Federal IT Work From Home Risks
Mar 24, 2021
This federal IT working from home guide will cover the risks involved and potential solutions.
Stack Memory: An Overview (Part 3)
Mar 23, 2021
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
How to Use Autoruns to Detect and Remove Malware on Windows
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
ReConnect - Ways Attackers Sidestep Your Endpoints
Mar 22, 2021
One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...
Try Varonis free.
Deploys in minutes.