Data Security
Adventures in Fileless Malware, Part II: Sneaky VBA Scripts
Jun 17, 2020
I’m a fan of the Hybrid Analysis site. It’s kind of a malware zoo where you can safely observe dangerous specimens captured in the wild without getting mauled. The HA...
Wyden’s Consumer Data Protection Act: Preview of US Privacy Law
Jun 17, 2020
The General Data Protection Regulation (GDPR) has, for good reason, received enormous coverage in the business and tech press in 2018. But wait, there’s another seismic privacy shift occurring, and...
Koadic: Security Defense in the Age of LoL Malware, Part IV
Jun 17, 2020
One of the advantages of examining the gears inside Koadic is that you gain low-level knowledge into how real-world attacks are accomplished. Pen testing tools allow you to explore how...
MITRE ATT&CK Framework: Everything You Need to Know
Jun 17, 2020
The MITRE ATT&CK matrices are an invaluable resource for cybersecurity pros. Read on to learn more about ATT&CK tactics and techniques.
Introducing Varonis Data Security Platform 6.4.100: Varonis Edge, GDPR Threat Models, Geolocation and More
Jun 17, 2020
It’s the beginning of a new year, and we have a huge new beta release to share with you. The beta release of the Varonis Data Security Platform 6.4.100 dropped...
How To Prevent Ransomware: The Basics
Jun 17, 2020
Ransomware is a destructive type of malware that has taken down city governments and cost organization millions. Learn more about how to prevent ransomware
7 Key Risk Indicators in the Varonis Active Directory Dashboard
Jun 17, 2020
All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...
Data Governance in Healthcare: Your Complete Guide
Jun 17, 2020
Data governance in healthcare is a critical discipline for any company that manages PHI. Learn more about the benefits and pitfalls of PHI in this blog.
12 Most Disregarded Cybersecurity Tasks
Jun 17, 2020
It is important that cybersecurity be prioritized by every level of individual in an organization. We're going over tips to follow to manage risk today.
What is OSINT?
Jun 17, 2020
Open source intelligence is often utilized by hackers and red teams to leverage public data while conducting investigations, often using database searches.
What is a Rootkit? How Can You Detect it?
Jun 17, 2020
Think there might be a chance you caught a rootkit virus? Learn more about these toolboxes of the malware world and just how to detect them with our guide.
Is Your Biggest Security Threat Already Inside Your Organization?
Jun 17, 2020
Is your company protected against insider threats? From malicious ex-employees to negligent staff, your biggest cybersecurity concern may already be inside.
Try Varonis free.
Deploys in minutes.