Blog

Data Security

What is CASB? All About Cloud Access Security Brokers

Michael Buckbee

Michael Buckbee

Cloud Access Security Brokers (CASBs) are a great cybersecurity tool. Read on to learn about CASBs work, the solutions they offer and how to choose one.

Cerber Ransomware: What You Need to Know

Michael Buckbee

Michael Buckbee

Cerber ransomware is a ransomware-as-a-service (RaaS) application that attacks your files by encrypting your important documents and database files. Learn how to protect your files from and keep your data safe.

Capital One's Cloud Breach & Why Data-Centric Security Matters

Rachel Hunt

Rachel Hunt

Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...

What is UEBA? Complete Guide to User and Entity Behavior Analytics

Michael Buckbee

Michael Buckbee

UEBA extends User Behavior Analytics to cover entities. In this guide, we’ll show you how to use UEBA, and how it can improve your cybersecurity

Sysmon Threat Analysis Guide

Michael Buckbee

Michael Buckbee

In my various pentesting experiments, I’ll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for...

What is SIEM? A Beginner’s Guide

Michael Buckbee

Michael Buckbee

Learn about Security Information and Event Management (SIEM), what it is, how it works, and how SIEM solutions can help your business.

What is DNS TTL + Best Practices

Michael Buckbee

Michael Buckbee

This article covers the topic of DNS TTL (time to live), best practices all aspects surrounding implementation. 

Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips

Michael Buckbee

Michael Buckbee

Microsoft Office 365 adds a layer of complexity to your data security strategy — learn how to protect data and improve collaboration in your organization.

Introducing the Varonis Remote Work Update

Michael Buckbee

Michael Buckbee

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

How to Use Nmap: Commands and Tutorial Guide

Michael Buckbee

Michael Buckbee

Nmap is a powerful, and fast network mapping tool. In this guide, we’ll explain how to install and use Nmap, and show you how to protect your networks.

Windows PowerShell vs. CMD: What's The Difference?

Michael Buckbee

Michael Buckbee

PowerShell is Microsoft’s updated shell that replaced the previous command prompt (CMD). Learn how to take advantage of cmdlets, piping, and third-party extensions.

Windows PowerShell Scripting Tutorial For Beginners

Michael Buckbee

Michael Buckbee

New to PowerShell scripting? Explore these scripting tutorials to learn to write and execute basic scripts, PowerShell cmdlets, aliases, pipes and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.