Blog

Data Security

Right to be Forgotten: Explained

Michael Buckbee

Michael Buckbee

Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.

Adventures in Fileless Malware, Part V: More DDE and COM Scriplets

Michael Buckbee

Michael Buckbee

In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...

Adventures in Fileless Malware, Part I

Michael Buckbee

Michael Buckbee

When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...

How to Discover GDPR Data With Varonis

Michael Buckbee

Michael Buckbee

GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...

What is Identity Access Management?

Michael Buckbee

Michael Buckbee

Identity and Access Management is a critical function for enterprises to control and monitor in order to safeguard all their data, systems, and people

Is Your Company Prepared for a Cyber Attack?

Rob Sobers

Rob Sobers

Would your company survive a cyber attack? Use our flowchart to see if your business is prepared for cybersecurity threats.

AWS vs Azure vs Google: Cloud Services Comparison

Michael Buckbee

Michael Buckbee

This AWS vs Azure vs Google comparison evaluates the pros and cons of these public cloud providers including pricing, computing, storage and other features.

Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I

Michael Buckbee

Michael Buckbee

In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....

Endpoint Detection and Response (EDR): Everything You Need to Know

Michael Buckbee

Michael Buckbee

Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!

The Difference Between Data Governance and IT Governance

Michael Buckbee

Michael Buckbee

Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...

Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit

Michael Buckbee

Michael Buckbee

After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...

Data Breach Response Times: Trends and Tips

Rob Sobers

Rob Sobers

We've taken a deep dive to discover the trends between different data breaches, their response times, the effect of response duration and what you can do to keep your response time down.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.