Blog

Data Security

How to use PowerShell Objects and Data Piping

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

More NSA Goodness: Shadow Brokers Release UNITEDRAKE

Michael Buckbee

Michael Buckbee

Looking for some good data security news after the devastating Equifax breach? You won’t find it in this post, although this proposed federal breach notification law could count as a...

Interview With Wade Baker: Verizon DBIR, Breach Costs, & Selling Boardrooms on Data Security

Michael Buckbee

Michael Buckbee

Wade Baker is best known for creating and leading the Verizon Data Breach Investigations Report (DBIR). Readers of this blog are familiar with the DBIR as our go-to resource for...

DNSMessenger: 2017's Most Beloved Remote Access Trojan (RAT)

Michael Buckbee

Michael Buckbee

I’ve written a lot about Remote Access Trojans (RATs) over the last few years. So I didn’t think there was that much innovation in this classic hacker software utility. RATs, of...

How to Protect GDPR Data with Varonis

Michael Buckbee

Michael Buckbee

In the overall data security paradigm, GDPR data isn’t necessarily more important than other sensitive data, but demands specific monitoring, policy, and processing – with significant fines to encourage compliance....

Adventures in Fileless Malware, Part II: Sneaky VBA Scripts

Michael Buckbee

Michael Buckbee

I’m a fan of the Hybrid Analysis site. It’s kind of a malware zoo where you can safely observe dangerous specimens captured in the wild without getting mauled. The HA...

Wyden’s Consumer Data Protection Act: Preview of US Privacy Law

Michael Buckbee

Michael Buckbee

The General Data Protection Regulation (GDPR) has, for good reason, received enormous coverage in the business and tech press in 2018. But wait, there’s another seismic privacy shift occurring, and...

Koadic: Security Defense in the Age of LoL Malware, Part IV

Michael Buckbee

Michael Buckbee

One of the advantages of examining the gears inside Koadic is that you gain low-level knowledge into how real-world attacks are accomplished. Pen testing tools allow you to explore how...

MITRE ATT&CK Framework: Everything You Need to Know

Michael Buckbee

Michael Buckbee

The MITRE ATT&CK matrices are an invaluable resource for cybersecurity pros. Read on to learn more about ATT&CK tactics and techniques.

Introducing Varonis Data Security Platform 6.4.100: Varonis Edge, GDPR Threat Models, Geolocation and More

Michael Buckbee

Michael Buckbee

It’s the beginning of a new year, and we have a huge new beta release to share with you.  The beta release of the Varonis Data Security Platform 6.4.100 dropped...

How To Prevent Ransomware: The Basics

Michael Buckbee

Michael Buckbee

Ransomware is a destructive type of malware that has taken down city governments and cost organization millions. Learn more about how to prevent ransomware

7 Key Risk Indicators in the Varonis Active Directory Dashboard

Michael Buckbee

Michael Buckbee

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.