Blog

Data Security

How to Use Volatility for Memory Forensics and Analysis

Neil Fox

Neil Fox

This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.

Two certifications shown on an aquamarine gradient background: One for CCSP and one for CISSP.

CCSP vs. CISSP: Which One Should You Take?

Josue Ledesma

Josue Ledesma

Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.

NIST Cybersecurity Framework 2.0 with Varonis

Unpacking NIST Cybersecurity Framework 2.0

Shawn Hays

Shawn Hays

Learn how you can implement the NIST Cybersecurity Framework (CSF) 2.0 within your own organization and how Varonis helps.

Your Guide to Simulated Cyberattacks: What is Penetration Testing?

David Harrington

David Harrington

Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.

What is Terraform: Everything You Need to Know

David Harrington

David Harrington

Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.

How to Use Ghidra to Reverse Engineer Malware

Neil Fox

Neil Fox

An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.

What Is a Botnet? Definition and Prevention

Josue Ledesma

Josue Ledesma

Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.

Common Types of Malware

Neil Fox

Neil Fox

This piece covers the various types of malware that are available and their characteristics.

Identify and Investigate Business Email Compromise (BEC) Scams

Ed Lin

Ed Lin

In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

What is an APT?: Advanced Persistent Threat Overview

Josue Ledesma

Josue Ledesma

Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.

What is a Brute Force Attack? Definition

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.

Defend Against Ransomware with the NIST Ransomware Profile

Yumna Moazzam

Yumna Moazzam

Learn about the NIST ransomware profile and how it can help defend against ransomware with Varonis.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.