Latest articles
North Carolina Proposes Tougher Breach Notification Rules
Jun 17, 2020
If you’ve been reading our amazing blog content and whitepaper on breach notification laws in the US and worldwide, you know there’s often a hidden loophole in the legalese. The...
What is a Rootkit? How Can You Detect it?
Jun 17, 2020
Think there might be a chance you caught a rootkit virus? Learn more about these toolboxes of the malware world and just how to detect them with our guide.
Ransomware Meets Its Match With Automated Cyber Defenses
Jun 17, 2020
The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...
Insider Threats: Stealthy Password Hacking With Smbexec
Jun 17, 2020
As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...
Varonis DataPrivilege and RSA® Identity Governance and Lifecycle
Jun 17, 2020
We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint. This Implementation Blueprint will help the business to quickly detect security...
Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?
Jun 17, 2020
Microsoft changed their guidance on permissions expiration policies. Should you change yours?
Understanding the Relationship Between the GDPR and ePrivacy Directive
Jun 17, 2020
Remember last May when our favorite sites were suddenly asking our consent to collect cookie information? The answer given by the media and other experts for this flurry of cookie...
How to Use Microsoft Teams Safely: Security and Compliance Basics
Jun 17, 2020
Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks
Right to be Forgotten: Explained
Jun 17, 2020
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Adventures in Fileless Malware, Part V: More DDE and COM Scriplets
Jun 17, 2020
In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...
Adventures in Fileless Malware, Part I
Jun 17, 2020
When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...
How to Discover GDPR Data With Varonis
Jun 17, 2020
GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...
Try Varonis free.
Deploys in minutes.