Data Security
Wyden's Consumer Data Protection Act: How to Be Compliant
Jun 17, 2020
Will 2019 be the year the US gets its own GDPR-like privacy law? Since my last post in this series, privacy legislation is becoming more certain to pass. Leaders from...
Understanding Security Analytics Platforms
Jun 17, 2020
I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...
Windows Defender Turned Off by Group Policy [Solved]
Jun 17, 2020
Windows Defender is a common AV solution, and attackers know how to work-around it. Learn how to turn Defender back on with this easy tutorial.
PowerShell for Pentesters: Scripts, Examples and Tips
Jun 17, 2020
This PowerShell for Pentesters' guide covers running commands, coding, tutorials and examples as well as the benefits of pentesting with PowerShell.
Add Varonis to IAM for Better Access Governance
Jun 17, 2020
Managing permissions is a colossal job fraught with peril, and over-permissive folders are the bane of InfoSec and a hacker’s delight. Many organizations employ IAM (Identity Access Management) to help...
What is CASB? All About Cloud Access Security Brokers
Jun 17, 2020
Cloud Access Security Brokers (CASBs) are a great cybersecurity tool. Read on to learn about CASBs work, the solutions they offer and how to choose one.
Cerber Ransomware: What You Need to Know
Jun 17, 2020
Cerber ransomware is a ransomware-as-a-service (RaaS) application that attacks your files by encrypting your important documents and database files. Learn how to protect your files from and keep your data safe.
Capital One's Cloud Breach & Why Data-Centric Security Matters
Jun 17, 2020
Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...
What is UEBA? Complete Guide to User and Entity Behavior Analytics
Jun 17, 2020
UEBA extends User Behavior Analytics to cover entities. In this guide, we’ll show you how to use UEBA, and how it can improve your cybersecurity
Sysmon Threat Analysis Guide
Jun 16, 2020
In my various pentesting experiments, I’ll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for...
What is SIEM? A Beginner’s Guide
Jun 15, 2020
Learn about Security Information and Event Management (SIEM), what it is, how it works, and how SIEM solutions can help your business.
What is DNS TTL + Best Practices
Jun 15, 2020
This article covers the topic of DNS TTL (time to live), best practices all aspects surrounding implementation.
Try Varonis free.
Deploys in minutes.