Blog

Data Security

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

Michael Buckbee

Michael Buckbee

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

CryptoLocker: Everything You Need to Know

Michael Buckbee

Michael Buckbee

CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”

3 Tips to Monitor and Secure Exchange Online

Michael Buckbee

Michael Buckbee

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...

Announcing Varonis Edge – to the Perimeter and Beyond

Michael Buckbee

Michael Buckbee

Email, web, and brute force attacks are the primary ways that malware gets through your defenses.  The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails.  Remote Access Trojans?...

How Varonis Levels Up Your Incident Response

Michael Buckbee

Michael Buckbee

Varonis arms your incident response team with expert playbooks on how to respond to common alerts, as well as a free IR service to help you when you need it most.

Kerberos Attack: Silver Ticket Edition

Michael Buckbee

Michael Buckbee

With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty...

DHS Emergency Directive 19-01: How to Detect DNS Attacks

David Gibson

David Gibson

On January 22, 2019, the United State Department of Homeland Security (DHS) released a warning for a DNS infrastructure hijacking attack against US government agencies. Let’s dig into the specifics...

12 TED Talks That Will Change the Way You Look at Business Cybersecurity

Rob Sobers

Rob Sobers

The world of business cybersecurity is always changing. Stay on top of trends and ahead of threats with our 12 favorite cybersecurity TED talks.

8 Events That Changed Cybersecurity Forever

Michael Buckbee

Michael Buckbee

Milestone incidents are what made cybersecurity what it is today - these are the top 8 events that changed cybersecurity, and why they (still) matter.

Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!

Michael Buckbee

Michael Buckbee

Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the...

Artificial Intelligence vs. Machine Learning in Cybersecurity

Rob Sobers

Rob Sobers

This guide compares artificial intelligence (AI), machine learning (ML) and deep learning (DL) and their roles in current and future cybersecurity practices

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Michael Buckbee

Michael Buckbee

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.