Data Security
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Feb 22, 2021
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
Group Policy Editor Guide: Access Options and How to Use
Feb 19, 2021
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
February 2021 Malware Trends Report
Feb 18, 2021
This Februrary 2021 malware trends report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
What Federal Agencies Should Take Away from SolarWinds Attack
Feb 09, 2021
While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.
What is DNS, How it Works + Vulnerabilities
Jan 29, 2021
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Hacking Wi-Fi With the ESP8266
Jan 29, 2021
Hack, monitor, and defend networks using the ESP8266 microcontroller and these Arduino based projects.
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
Jan 29, 2021
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
What Is Cryptojacking? Prevention and Detection Tips
Jan 29, 2021
Learn how cryptocurrency, cryptomining and cryptojacking work — also included are tips to prevent and detect cryptojacking before it's too late
IPv6 Security Guide: Do you Have a Blindspot?
Jan 28, 2021
Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.
11 Best Malware Analysis Tools and Their Features
Jan 27, 2021
An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.
Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low
Jan 27, 2021
How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...
What is x64dbg + How to Use It
Jan 27, 2021
Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.
Try Varonis free.
Deploys in minutes.