Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Privacy & Compliance
Jun 03, 2022
ISO 27001 Compliance Guide: Essential Tips and Insights
Looking to earn ISO 27001 compliance? Learn about this widely known information security standard, what’s in it, and how to become certified.
Robert Grimmick
9 min read
-
Privacy & Compliance
Jun 03, 2022
NIST 800-53: Definition and Tips for Compliance
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
Josue Ledesma
4 min read
-
Privacy & Compliance
Jun 02, 2022
NIST 800-171 Compliance Checklist and Terminology Reference
Government contractors who handle Controlled Unclassified Information (CUI) must be NIST 800-171 compliant. Use this checklist as a complete reference.
David Harrington
9 min read
-
Jun 02, 2022
How to Prepare for a Salesforce Permissions Audit
In this post, I'll walk you through what a Salesforce audit is, how permissions work, and provide tips on how you can prepare.
Mike Mason
5 min read
-
Data Security
May 20, 2022
82 Must-Know Data Breach Statistics [updated 2024]
These data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.
Rob Sobers
11 min read
-
Ransomware
May 16, 2022
Why Every Cybersecurity Leader Should ‘Assume Breach’
Any system, account or person at any time can be a potential attack vector. With such a vast attack surface, you need to assume attackers will breach at least one vector.
Yaki Faitelson
3 min read
-
Threat Research
May 11, 2022
Spoofing SaaS Vanity URLs for Social Engineering Attacks
SaaS vanity URLs can be spoofed and used for phishing campaigns and other attacks. In this article, we’ll showcase two Box link types, two Zoom link types, and two Google Docs link type that we were able to spoof.
Tal Peleg
6 min read
-
Ransomware
May 06, 2022
Bad Rabbit Ransomware
Bad Rabbit is a ransomware strain that spread via hacked websites, infected systems via a fake Adobe installer and held encrypted files for Bitcoin.
Michael Raymond
3 min read
-
Threat Research
Apr 19, 2022
Hive Ransomware Analysis
Learn how Hive ransomware exploits public servers, spreads through your network, encrypts sensitive files, and exports victims for cryptocurrency.
Nadav Ovadia
7 min read
-
Data Security
Apr 12, 2022
How to Use Volatility for Memory Forensics and Analysis
This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.
Neil Fox
8 min read
-
Data Security
Apr 07, 2022
CCSP vs. CISSP: Which One Should You Take?
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
Josue Ledesma
5 min read
-
Data Security
Apr 06, 2022
Unpacking NIST Cybersecurity Framework 2.0
Learn how you can implement the NIST Cybersecurity Framework (CSF) 2.0 within your own organization and how Varonis helps.
Shawn Hays
8 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital