Blog

Data Security

Adventures in Fileless Malware, Part II: Sneaky VBA Scripts

Michael Buckbee

Michael Buckbee

I’m a fan of the Hybrid Analysis site. It’s kind of a malware zoo where you can safely observe dangerous specimens captured in the wild without getting mauled. The HA...

Wyden’s Consumer Data Protection Act: Preview of US Privacy Law

Michael Buckbee

Michael Buckbee

The General Data Protection Regulation (GDPR) has, for good reason, received enormous coverage in the business and tech press in 2018. But wait, there’s another seismic privacy shift occurring, and...

Koadic: Security Defense in the Age of LoL Malware, Part IV

Michael Buckbee

Michael Buckbee

One of the advantages of examining the gears inside Koadic is that you gain low-level knowledge into how real-world attacks are accomplished. Pen testing tools allow you to explore how...

MITRE ATT&CK Framework: Everything You Need to Know

Michael Buckbee

Michael Buckbee

The MITRE ATT&CK matrices are an invaluable resource for cybersecurity pros. Read on to learn more about ATT&CK tactics and techniques.

Introducing Varonis Data Security Platform 6.4.100: Varonis Edge, GDPR Threat Models, Geolocation and More

Michael Buckbee

Michael Buckbee

It’s the beginning of a new year, and we have a huge new beta release to share with you.  The beta release of the Varonis Data Security Platform 6.4.100 dropped...

How To Prevent Ransomware: The Basics

Michael Buckbee

Michael Buckbee

Ransomware is a destructive type of malware that has taken down city governments and cost organization millions. Learn more about how to prevent ransomware

7 Key Risk Indicators in the Varonis Active Directory Dashboard

Michael Buckbee

Michael Buckbee

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Data Governance in Healthcare: Your Complete Guide

Michael Buckbee

Michael Buckbee

Data governance in healthcare is a critical discipline for any company that manages PHI. Learn more about the benefits and pitfalls of PHI in this blog.

12 Most Disregarded Cybersecurity Tasks

Rob Sobers

Rob Sobers

It is important that cybersecurity be prioritized by every level of individual in an organization. We're going over tips to follow to manage risk today.

What is OSINT?

Kody Kinzie

Kody Kinzie

Open source intelligence is often utilized by hackers and red teams to leverage public data while conducting investigations, often using database searches.

What is a Rootkit? How Can You Detect it?

Michael Buckbee

Michael Buckbee

Think there might be a chance you caught a rootkit virus? Learn more about these toolboxes of the malware world and just how to detect them with our guide. 

Is Your Biggest Security Threat Already Inside Your Organization?

Rob Sobers

Rob Sobers

Is your company protected against insider threats? From malicious ex-employees to negligent staff, your biggest cybersecurity concern may already be inside.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.