Blog

Data Security

Is Your Company Prepared for a Cyber Attack?

Rob Sobers

Rob Sobers

Would your company survive a cyber attack? Use our flowchart to see if your business is prepared for cybersecurity threats.

Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I

Michael Buckbee

Michael Buckbee

In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....

Endpoint Detection and Response (EDR): Everything You Need to Know

Michael Buckbee

Michael Buckbee

Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!

The Difference Between Data Governance and IT Governance

Michael Buckbee

Michael Buckbee

Lately, we’ve been so focused on data governance, extracting the most value from our data and preventing the next big breach, many of us have overlooked IT governance fundamentals, which...

Adventures in Fileless Malware, Part III: Obfuscated VBA Scripts for Fun and Profit

Michael Buckbee

Michael Buckbee

After yakking in the last two posts about malware-free or fileless attack techniques, we’re ready to handle a dangerous specimen. The Hybrid Analysis site is the resource I rely on to...

Data Breach Response Times: Trends and Tips

Rob Sobers

Rob Sobers

We've taken a deep dive to discover the trends between different data breaches, their response times, the effect of response duration and what you can do to keep your response time down.

What is an Active Directory Forest?

Michael Buckbee

Michael Buckbee

An Active Directory forest is the top most logical container in an Active Directory configuration that contains domains, users, computers, and group policies.

Wyden's Consumer Data Protection Act: How to Be Compliant

Michael Buckbee

Michael Buckbee

Will 2019 be the year the US gets its own GDPR-like privacy law? Since my last post in this series, privacy legislation is becoming more certain to pass. Leaders from...

Understanding Security Analytics Platforms

Michael Buckbee

Michael Buckbee

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Windows Defender Turned Off by Group Policy [Solved]

Michael Buckbee

Michael Buckbee

Windows Defender is a common AV solution, and attackers know how to work-around it. Learn how to turn Defender back on with this easy tutorial.

PowerShell for Pentesters: Scripts, Examples and Tips

Michael Buckbee

Michael Buckbee

This PowerShell for Pentesters' guide covers running commands, coding, tutorials and examples as well as the benefits of pentesting with PowerShell.

Add Varonis to IAM for Better Access Governance

Michael Buckbee

Michael Buckbee

Managing permissions is a colossal job fraught with peril, and over-permissive folders are the bane of InfoSec and a hacker’s delight. Many organizations employ IAM (Identity Access Management) to help...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.