Yaki Faitelson

Latest articles

American Eagle with an error computer code, symbolizing the new SEC cybersecurity disclosure requirements in America

What The New SEC Cyber Disclosure Guidelines Mean For Your Business

Yaki Faitelson

Yaki Faitelson

Discover the challenges the new SEC cybersecurity guidelines present for your CISO and learn tips on how to handle them at your organization.

shield with person attempting to infiltrate it, depicting AI security risks

AI at Work: Three Steps to Prepare and Protect Your Business

Yaki Faitelson

Yaki Faitelson

Discover how your business can prepare and protect your sensitive data from the risks that generative AI presents.

Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe

Yaki Faitelson

Yaki Faitelson

This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.

What Automation Means For Cybersecurity—And Your Business

Yaki Faitelson

Yaki Faitelson

This article explains how automation can help turn the right information into action, helping to defend against cyberattacks, mitigate risk, shore up compliance and improve productivity.

Four Must-Know Cyber Tips for Your Business

Yaki Faitelson

Yaki Faitelson

The real story behind today’s breaches is never about an isolated bad decision—it’s about the many decisions made long before a sleepy network administrator gets a call from an attacker.

Your Sales Data Is Mission-Critical: Are You Protecting It?

Yaki Faitelson

Yaki Faitelson

If you’re like many executives, you might assume your data is secure within those cloud applications. That’s a dangerous assumption, though. Cloud providers are responsible for everything that delivers their application (e.g., their data center); it’s your responsibility to protect the data inside it.

Why Every Cybersecurity Leader Should ‘Assume Breach’

Yaki Faitelson

Yaki Faitelson

Any system, account or person at any time can be a potential attack vector. With such a vast attack surface, you need to assume attackers will breach at least one vector.

What Every CEO Should Know About Modern Ransomware Attacks

Yaki Faitelson

Yaki Faitelson

How To Make Yourself A Tougher Cybersecurity Target

Cloud Applications Put Your Data At Risk - Here's How To Regain Control

Yaki Faitelson

Yaki Faitelson

Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...

Think Your Data Is Secure? Three Questions You Need To Answer Right Now

Yaki Faitelson

Yaki Faitelson

As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.

The Dawn Of The Four-Minute Cyberattack: Four Steps To Protect Your Company

Yaki Faitelson

Yaki Faitelson

Attack chains that were once only theoretical are now a reality. SolarWinds was the Roger Bannister of cyberattacks — now that we’ve had one breakthrough, we will have others.

Polyrize Acquisition

Yaki Faitelson

Yaki Faitelson

I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.