-
Active Directory Data Security
Mar 25, 2021
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
Neeraj Kumar
9 min read
-
Data Security
Mar 25, 2021
What is Data Integrity and How Can You Maintain it?
Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here.
Michael Buckbee
4 min read
-
Data Security
Mar 25, 2021
What is Data Classification? Guidelines and Process
Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2021
How to Use Netcat Commands: Examples and Cheat Sheets
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Michael Buckbee
7 min read
-
Data Security
Mar 24, 2021
Addressing New Federal IT Work From Home Risks
This federal IT working from home guide will cover the risks involved and potential solutions.
David Harrington
5 min read
-
Data Security
Mar 23, 2021
Stack Memory: An Overview (Part 3)
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
Neil Fox
9 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
Neil Fox
6 min read
-
Data Security
Mar 22, 2021
ReConnect - Ways Attackers Sidestep Your Endpoints
One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...
Kilian Englert
1 min read
-
Data Security
Mar 18, 2021
How APTs Use Reverse Proxies to Nmap Internal Networks
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
Tokyoneon
4 min read
-
Data Security Security Bulletins Threat Research
Mar 17, 2021
How to Unpack Malware with x64dbg
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Neil Fox
11 min read
-
Data Security
Mar 10, 2021
Detecting Honeypot Access With Varonis
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
Michael Buckbee
3 min read
-
Data Security PowerShell Security Bulletins
Mar 08, 2021
How to Merge in Git: Remote and Local Git Repositories Tutorial
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Jeff Brown
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital