-
Ransomware
Jan 24, 2022
What Every CEO Should Know About Modern Ransomware Attacks
How To Make Yourself A Tougher Cybersecurity Target
Yaki Faitelson
3 min read
-
Threat Research
Jan 18, 2022
Mixed Messages: Busting Box’s MFA Methods
Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification.
Tal Peleg
3 min read
-
Data Security
Dec 08, 2021
What is an APT?: Advanced Persistent Threat Overview
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
Josue Ledesma
4 min read
-
Data Security
Dec 08, 2021
What is a Brute Force Attack? Definition
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.
Michael Buckbee
4 min read
-
Threat Research
Dec 02, 2021
Bypassing Box's Time-based One-Time Password MFA
The Varonis research team discovered a way to bypass Box's Time-based One-Time Password MFA for Box accounts that use authenticator applications.
Tal Peleg
2 min read
-
Data Security
Dec 01, 2021
Defend Against Ransomware with the NIST Ransomware Profile
Learn about the NIST ransomware profile and how it can help defend against ransomware with Varonis.
Yumna Moazzam
4 min read
-
Data Security
Nov 18, 2021
How to Monitor Network Traffic: Effective Steps & Tips
In this article, you will learn how to monitor network traffic using different tools and methods.
David Harrington
4 min read
-
Threat Research
Nov 17, 2021
No Time to REST: Check Your Jira Permissions for Leaks
Varonis researchers enumerated a list of 812 subdomains and found 689 accessible Jira instances. We found 3,774 public dashboards, 244 projects, and 75,629 issues containing email addresses, URLs, and IP...
Omri Marom
4 min read
-
Data Security
Nov 17, 2021
What is Role-Based Access Control (RBAC)?
Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we'll explain what RBAC is, and how to implement it.
Neeraj Kumar
6 min read
-
Data Security
Nov 17, 2021
What is a Security Operations Center (SOC)?
What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.
David Harrington
8 min read
-
Data Security
Nov 16, 2021
INVEST in America Act: Billion-Dollar Funding for Cybersecurity
The INVEST in America Act provides nearly two billion dollars in funding to enhance the nation's cybersecurity. Who should care? State, local, and tribal governments. $1 billion in funding over...
Nathan Coppinger
3 min read
-
Data Security
Nov 05, 2021
Cloud Applications Put Your Data At Risk - Here's How To Regain Control
Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...
Yaki Faitelson
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital