Blog

Data Security

Watch: Varonis ReConnect!

Rachel Hunt

Rachel Hunt

Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...

What is DNS Tunneling? A Detection Guide

Michael Buckbee

Michael Buckbee

Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them

How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests

Michael Buckbee

Michael Buckbee

Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...

How Varonis Helps Stop Emotet

Rob Sobers

Rob Sobers

Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.

Data Privacy Guide: Definitions, Explanations and Legislation

Michael Buckbee

Michael Buckbee

Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.

Cloud Migration strategy tips from Varonis

Data Migration Strategy Guide: Best Practices for Success and Security

Rob Sobers

Rob Sobers

Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.

Government Hacking Exploits, Examples and Prevention Tips

Rob Sobers

Rob Sobers

In this guide, we’ll explore how governments launch attacks, the different government hacking exploits and how you can defend yourself.

We Know About Your Company's Data: OSINT Lessons for C-Levels

Michael Buckbee

Michael Buckbee

 I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant

Eric Saraga

Eric Saraga

Phishing remains one of the most successful ways to infiltrate an organization. We’ve seen a massive amount of malware infections stemming from users opening infected attachments or clicking links that...

Varonis eBook: WMI Events and Insider Surveillance

Michael Buckbee

Michael Buckbee

If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...

The No Hassle Guide to Event Query Language (EQL) for Threat Hunting

Michael Buckbee

Michael Buckbee

Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...

What is a Man-in-the-Middle Attack: Detection and Prevention Tips

Michael Buckbee

Michael Buckbee

Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.