Blog

Data Security

Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software

Avia Navickas

Avia Navickas

Varonis was rated 4.6 out of 5 stars in Gartner Peer Insights File Analysis Software, based on 211 reviews as of 23 July 2020. Download the full report.

DNS Security Guide

Michael Buckbee

Michael Buckbee

DNS security should be considered an essential part of any business's security plan. Our goal in this piece is to help provide information to best inform you of all options around securing your DNS.

Active Directory Account Lockout: Tools and Diagnosis Guide

Michael Buckbee

Michael Buckbee

AD Account Lockouts are perhaps the biggest source of frustration for IT admins. In this guide, we’ll explain how they happen, and how to prevent them.

Malware Protection: Basics and Best Practices

Michael Buckbee

Michael Buckbee

Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.

What is a Domain Controller, When is it Needed + Set Up

Michael Buckbee

Michael Buckbee

Domain controllers are common targets of attackers. Learn how to protect and secure your domain controllers to prevent data breaches.

Working With Windows Local Administrator Accounts, Part II

Michael Buckbee

Michael Buckbee

Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...

Finding EU Personal Data With Regular Expressions (Regexes)

Michael Buckbee

Michael Buckbee

If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...

How To Get Started with PowerShell and Active Directory Scripting

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

Detecting Malware Payloads in Office Document Metadata

Rob Sobers

Rob Sobers

Ever consider document properties like “Company,” “Title,” and “Comments” a vehicle for a malicious payload? Checkout this nifty PowerShell payload in the company metadata: #powershell payload stored in office metadataDocument...

Working With Windows Local Administrator Accounts, Part I

Michael Buckbee

Michael Buckbee

In writing about hackers and their techniques, the issue of Windows local Administrator accounts often comes up. Prior to Windows 7, the Administrator account was created by default with no...

Defining Deviancy With User Behavior Analytics

Matt Radolec

Matt Radolec

For over the last 10 years, security operations centers and analysts have been trading indicators of compromise (IoC), signatures or threshold-based signs of intrusion or attempted intrusion, to try to...

PowerShell Obfuscation: Stealth Through Confusion, Part I

Michael Buckbee

Michael Buckbee

To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.