Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Jun 29, 2022
What is Open XDR? Benefits and Security Comparisons
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
Josue Ledesma
5 min read
-
Data Security
Jun 25, 2022
What is Traceroute? How It Works and How to Read Results
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.
Robert Grimmick
10 min read
-
Ransomware
Jun 25, 2022
Ryuk Ransomware: Breakdown and Prevention Tips
Ryuk ransomware targets large organizations and spreads with deadly speed. Learn about the strain and how to prevent your company from becoming a victim.
David Harrington
6 min read
-
Data Security
Jun 24, 2022
What is an Insider Threat? Definition and Examples
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.
Robert Grimmick
7 min read
-
Data Security
Jun 24, 2022
Evil Twin Attack: What it is, How to Detect & Prevent it
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
Josue Ledesma
5 min read
-
Threat Research
Jun 17, 2022
Anatomy of a LockBit Ransomware Attack
A detailed case study of the exact techniques and methods that threat actors used in a real-life ransomware attack.
Joseph Avanzato
8 min read
-
Data Security
Jun 16, 2022
What is Cyber Espionage? Complete Guide with Protection Tips
Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.
Robert Grimmick
11 min read
-
Threat Research
Jun 16, 2022
Rogue Shortcuts: LNK'ing to Badness
Learn how threat actors continue to manipulate Windows shortcut files (LNKs) as an exploit technique.
Jason Hill
5 min read
-
Varonis Products
Jun 15, 2022
Varonis Adds Data Classification Support for Amazon S3
Varonis bolsters cloud security offering with data classification for Amazon S3.
Nathan Coppinger
5 min read
-
Active Directory
Jun 15, 2022
Group Policy Objects (GPOs): How They Work & Configuration Steps
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
David Harrington
6 min read
-
Data Security
Jun 15, 2022
Data Protection Guide: How To Secure Google Drive for Your Business
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
David Harrington
7 min read
-
Privacy & Compliance
Jun 07, 2022
What Is Data Governance? Framework and Best Practices
Data Governance helps organize, secure, and standardize data for all types of organizations. Learn more about data governance frameworks here.
David Harrington
9 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital