Data Security
DHS Emergency Directive 19-01: How to Detect DNS Attacks
Mar 29, 2020
On January 22, 2019, the United State Department of Homeland Security (DHS) released a warning for a DNS infrastructure hijacking attack against US government agencies. Let’s dig into the specifics...
12 TED Talks That Will Change the Way You Look at Business Cybersecurity
Mar 29, 2020
The world of business cybersecurity is always changing. Stay on top of trends and ahead of threats with our 12 favorite cybersecurity TED talks.
8 Events That Changed Cybersecurity Forever
Mar 29, 2020
Milestone incidents are what made cybersecurity what it is today - these are the top 8 events that changed cybersecurity, and why they (still) matter.
Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!
Mar 29, 2020
Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the...
Artificial Intelligence vs. Machine Learning in Cybersecurity
Mar 29, 2020
This guide compares artificial intelligence (AI), machine learning (ML) and deep learning (DL) and their roles in current and future cybersecurity practices
Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks
Mar 29, 2020
Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results — where the credit cards numbers are...
Kerberos Authentication Explained
Mar 29, 2020
Learn more about Kerberos Authentication, the widely-used authorization technology. Contact us today to learn how Varonis monitors Kerberos, and more.
9 Infamous APT Groups: Fast Fact Trading Cards
Mar 29, 2020
APT groups consist of capable and elusive members who wreak havoc on their targets — learn about infamous APT groups and their MOs through “trading cards”
The Difference Between E3 and E5 Office365 Features
Mar 29, 2020
Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...
PowerShell Obfuscation: Stealth Through Confusion, Part II
Mar 29, 2020
Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...
Data Security 2017: We’re All Hacked
Mar 29, 2020
Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there...
Do Americans Ever Change Their Passwords?
Mar 29, 2020
Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017...
Try Varonis free.
Deploys in minutes.