Data Security
Data Migration Strategy Guide: Best Practices for Success and Security
Sep 24, 2020
Learn best practices for your cloud migration strategy and get a step-by-step plan for a secure and effective process.
Government Hacking Exploits, Examples and Prevention Tips
Sep 08, 2020
In this guide, we’ll explore how governments launch attacks, the different government hacking exploits and how you can defend yourself.
We Know About Your Company's Data: OSINT Lessons for C-Levels
Sep 02, 2020
I’ve been on a mission the last few months to bring basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...
Using Malicious Azure Apps to Infiltrate a Microsoft 365 Tenant
Aug 20, 2020
Phishing remains one of the most successful ways to infiltrate an organization. We’ve seen a massive amount of malware infections stemming from users opening infected attachments or clicking links that...
Varonis eBook: WMI Events and Insider Surveillance
Aug 12, 2020
If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...
The No Hassle Guide to Event Query Language (EQL) for Threat Hunting
Aug 12, 2020
Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Aug 10, 2020
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software
Jul 29, 2020
Varonis was rated 4.6 out of 5 stars in Gartner Peer Insights File Analysis Software, based on 211 reviews as of 23 July 2020. Download the full report.
DNS Security Guide
Jul 28, 2020
DNS security should be considered an essential part of any business's security plan. Our goal in this piece is to help provide information to best inform you of all options around securing your DNS.
Active Directory Account Lockout: Tools and Diagnosis Guide
Jul 14, 2020
AD Account Lockouts are perhaps the biggest source of frustration for IT admins. In this guide, we’ll explain how they happen, and how to prevent them.
Malware Protection: Basics and Best Practices
Jun 23, 2020
Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.
What is a Domain Controller, When is it Needed + Set Up
Jun 23, 2020
Domain controllers are common targets of attackers. Learn how to protect and secure your domain controllers to prevent data breaches.
Try Varonis free.
Deploys in minutes.