Data Security
How to Use Volatility for Memory Forensics and Analysis
Apr 12, 2022
This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.
CCSP vs. CISSP: Which One Should You Take?
Apr 07, 2022
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
Unpacking NIST Cybersecurity Framework 2.0
Apr 06, 2022
Learn how you can implement the NIST Cybersecurity Framework (CSF) 2.0 within your own organization and how Varonis helps.
Your Guide to Simulated Cyberattacks: What is Penetration Testing?
Mar 31, 2022
Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.
What is Terraform: Everything You Need to Know
Mar 30, 2022
Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.
How to Use Ghidra to Reverse Engineer Malware
Mar 21, 2022
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
What Is a Botnet? Definition and Prevention
Mar 18, 2022
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
Common Types of Malware
Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.
Identify and Investigate Business Email Compromise (BEC) Scams
Feb 10, 2022
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.
What is an APT?: Advanced Persistent Threat Overview
Dec 08, 2021
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
What is a Brute Force Attack? Definition
Dec 08, 2021
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.
Defend Against Ransomware with the NIST Ransomware Profile
Dec 01, 2021
Learn about the NIST ransomware profile and how it can help defend against ransomware with Varonis.
Try Varonis free.
Deploys in minutes.