Blog

Data Security

What is DNS TTL + Best Practices

Michael Buckbee

Michael Buckbee

This article covers the topic of DNS TTL (time to live), best practices all aspects surrounding implementation. 

Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips

Michael Buckbee

Michael Buckbee

Microsoft Office 365 adds a layer of complexity to your data security strategy — learn how to protect data and improve collaboration in your organization.

Introducing the Varonis Remote Work Update

Michael Buckbee

Michael Buckbee

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

How to Use Nmap: Commands and Tutorial Guide

Michael Buckbee

Michael Buckbee

Nmap is a powerful, and fast network mapping tool. In this guide, we’ll explain how to install and use Nmap, and show you how to protect your networks.

Windows PowerShell vs. CMD: What's The Difference?

Michael Buckbee

Michael Buckbee

PowerShell is Microsoft’s updated shell that replaced the previous command prompt (CMD). Learn how to take advantage of cmdlets, piping, and third-party extensions.

Windows PowerShell Scripting Tutorial For Beginners

Michael Buckbee

Michael Buckbee

New to PowerShell scripting? Explore these scripting tutorials to learn to write and execute basic scripts, PowerShell cmdlets, aliases, pipes and more.

GDPR Requirements in Plain English

Michael Buckbee

Michael Buckbee

You just want to answer the question: “What do I need to do for GDPR?” Maybe you've worked your way through a few online quizzes to test for GDPR readiness or skimmed an article that made some vague suggestions. Learn the GDPR requirements.

24 Essential Penetration Testing Tools in 2020

Michael Buckbee

Michael Buckbee

A collection of the top penetration testing tools along with their best uses and supported platforms to help you find the pentesting tool you need.

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Michael Buckbee

Michael Buckbee

Achieving compliance with HIPAA, PCI, GDPR, and CCPA regulations in your Azure system can be complex. In this guide, we’ll show you how.

COVID-19 Threat Update #6

Kilian Englert

Kilian Englert

Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...

COVID-19 Threat Update #5

Kilian Englert

Kilian Englert

The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...

Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials

Eric Saraga

Eric Saraga

We created a proof-of-concept that manipulates the Azure authentication function to give us a ‘skeleton key’ password that will work for all users, and dump all real clear-text usernames and passwords into a file.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.