Data Security
Right to be Forgotten: Explained
Jun 17, 2020
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Adventures in Fileless Malware, Part V: More DDE and COM Scriplets
Jun 17, 2020
In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...
Adventures in Fileless Malware, Part I
Jun 17, 2020
When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...
How to Discover GDPR Data With Varonis
Jun 17, 2020
GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...
What is Identity Access Management?
Jun 17, 2020
Identity and Access Management is a critical function for enterprises to control and monitor in order to safeguard all their data, systems, and people
Is Your Company Prepared for a Cyber Attack?
Jun 17, 2020
Would your company survive a cyber attack? Use our flowchart to see if your business is prepared for cybersecurity threats.
AWS vs Azure vs Google: Cloud Services Comparison
Jun 17, 2020
This AWS vs Azure vs Google comparison evaluates the pros and cons of these public cloud providers including pricing, computing, storage and other features.
Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I
Jun 17, 2020
In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....
Endpoint Detection and Response (EDR): Everything You Need to Know
Jun 17, 2020
Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!
The Difference Between Data Governance and IT Governance
Jun 17, 2020
Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...
Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit
Jun 17, 2020
After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...
Data Breach Response Times: Trends and Tips
Jun 17, 2020
We've taken a deep dive to discover the trends between different data breaches, their response times, the effect of response duration and what you can do to keep your response time down.
Try Varonis free.
Deploys in minutes.