Blog

Data Security

Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365

Nathan Coppinger

Nathan Coppinger

Varonis version 8.5 is here. Discover organization-wide exposure and learn how to combat insider risk in Microsoft 365 with this new update.

Exfiltrate NTLM Hashes with PowerShell Profiles

Tokyoneon

Tokyoneon

Learn how to exfiltrate NTLM hashes using PowerShell, Mimikatz, Hashcat and other techniques through real code examples, gif walkthroughs and screenshots.

What Is Network Segmentation?

Robert Grimmick

Robert Grimmick

Network segmentation is the act of dividing a computer network into smaller physical or logical components in order to increase security and protect data.

Phishing Attacks: Types, Prevention, and Examples

Robert Grimmick

Robert Grimmick

Phishing attacks use fraud to trick users into revealing information or opening malware. They are a popular attack technique among many types of threat actors.

5 Priorities for the CISO Budget In 2021

Michael Buckbee

Michael Buckbee

Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.

What is a Port Scanner and How Does it Work?

Michael Buckbee

Michael Buckbee

Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.

What is Role-Based Access Control (RBAC)?

Michael Buckbee

Michael Buckbee

Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we’ll explain what RBAC is, and how to implement it.

Netwalker Ransomware Guide: Everything You Need to Know

Nathan Coppinger

Nathan Coppinger

Ransomware has been on the rise. The Netwalker ransomware has begun a widespread attack campaign, and everyone should know how to defend themselves

The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files

Rachel Hunt

Rachel Hunt

Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...

Finding Data Owners with Varonis

Michael Buckbee

Michael Buckbee

Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.

What is an Incident Response Plan and How to Create One

Neil Fox

Neil Fox

We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.

Watch: Varonis ReConnect!

Rachel Hunt

Rachel Hunt

Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.