Blog

Data Security

Varonis Data Security Platform Listed in Gartner 2017 Market Guide for Data-Centric Audit and Protection

Rachel Hunt

Rachel Hunt

In 2005, our founders had a vision to build a solution focused on protecting the data organizations have the most of and yet know the least about – files and...

Practical PowerShell for IT Security, Part III: Classification on a Budget

Michael Buckbee

Michael Buckbee

Last time, with a few lines of PowerShell code, I launched an entire new software category, File Access Analytics (FAA). My 15-minutes of fame is almost over, but I was...

Practical PowerShell for IT Security, Part I: File Event Monitoring

Michael Buckbee

Michael Buckbee

Back when I was writing the ultimate penetration testing series to help humankind deal with hackers, I came across some interesting PowerShell cmdlets and techniques. I made the remarkable discovery...

Cloudbleed - Cloudflare Unauthorized Data Leak

Michael Buckbee

Michael Buckbee

Cloudflare is a huge internet infrastructure company (5.5 million websites), which means that you likely use them every day that you’re online, without ever realizing it. Depending on what metric...

Connecting Your Data Strategy to Analytics: Eight Questions to Ask

Michael Buckbee

Michael Buckbee

Big data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science...

How to setup a SPF record to prevent spam and spear phishing

Michael Buckbee

Michael Buckbee

Some things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid. When other things are combined...

I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work

Michael Buckbee

Michael Buckbee

Alan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers....

Ransomware: Legal Cheat Sheet for Breach Notification

Michael Buckbee

Michael Buckbee

You respond to a ransomware attack in many of the same ways you would to any other cyber attack. In short: have plans in place to analyze the malware, contain...

New Mirai Attacks, But It’s Still About Passwords

Michael Buckbee

Michael Buckbee

Last week, Mirai-like wormware made the news again with attacks on ISPs in the UK. Specifically, customers of TalkTalk and PostOffice reported Internet outages. As with the last Mirai incident...

PowerView Pen Testing

Michael Buckbee

Michael Buckbee

Pen Testing Active Directory Environments, PowerView, and how to go on the offensive with AD, take a look at our guide!

Why UBA Will Catch the Zero-Day Ransomware Attacks (That Endpoint Protection Can’t)

Kieran Laffan

Kieran Laffan

Ransomware attacks have become a major security threat. It feels like each week a new variant is announced –Ransom32, 7ev3n. This malware may even be involved in the next big...

Understanding SQL Injection, Identification and Prevention

Michael Buckbee

Michael Buckbee

When you think of a website getting hacked, you might picture someone in a hoodie in a high tech bunker (or their mom’s basement), wailing on a keyboard, controlling thousands...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.