-
Security Bulletins
Jul 06, 2021
REvil Ransomware Attack on Kaseya VSA: What You Need to Know
On July 3rd, at 10:00 AM EST, a malicious hotfix was released and pushed by Kaseya VSA servers that propagated to servers managed by Kaseya, resulting in the compromise and encryption of thousands of nodes at hundreds of different businesses.
Dvir Sason
6 min read
-
Data Security
Jul 06, 2021
Last Week in Ransomware: Week of July 5th
Ransomware in the News Before we get to the major ransomware attack that occurred over the holiday weekend, let’s take a look at some of the other stories from the past week.
Michael Raymond
2 min read
-
Data Security
Jul 06, 2021
What is Data Security?: Definition, Explanation and Guide
Data security is a practice and methodology designed to prevent data breaches and protect sensitive information from malicious actors. Data security is also instrumental in complying with regulations such as HIPAA, GDPR, CCPA, NIST, and ITAR.
Nolan Necoechea
8 min read
-
Active Directory
Jun 30, 2021
Understanding Azure DevOps and Building CI/CD Pipeline
Are you interested in learning about the tool that helps to automate and manage the complete software development lifecycle? Well, Azure DevOps is the answer for you, but before we dive deeper into understanding what Azure DevOps is and how it helps the teams during product development and release, let’s first try to build our understanding on DevOps.
Neeraj Kumar
8 min read
-
Data Security
Jun 29, 2021
Your Guide to Salesforce Data Protection
3.86 Million Dollars. That is the approximate cost of a data breach on any business worldwide in 2020. The number increases to 8.64 million dollars in expenses in the United States alone. Let us add that it takes an average of 228 days in 2020 to identify a breach event. These statistics alone can give any customer-facing business sleepless nights, and regulatory agencies worldwide can exert punitive action for any business not being scrupulous enough in their data security. The amount of money spent on data security and protection has continued to rise in the last three years, with a bulk of the IT budget spent on cloud and data security in 2020. Customer data platforms like Salesforce command the lion’s share of these customer data sets. So it follows that these businesses spend a bulk of their resources for Salesforce data security and protection every year.
Renganathan Padmanabhan
4 min read
-
Active Directory
Jun 28, 2021
Exploring ARM Templates: Azure Resource Manager Tutorial
Are you tired of clicking around the Azure portal creating virtual machines, storage accounts, and app services? Do you need a reliable method of creating the same environment multiple times? It sounds like you need to write some ARM templates!
Jeff Brown
11 min read
-
Data Security
Jun 28, 2021
ReConnect - Meet DatAdvantage Cloud
Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Kilian Englert
1 min read
-
Data Security
Jun 28, 2021
Last Week in Ransomware: Week of June 28th
Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately. Due to a flaw hackers have been able to delete all the contents of the hard drives remotely. And now attackers are try to monetize it with ransomware.
Michael Raymond
2 min read
-
Data Security
Jun 25, 2021
SIEM Tools: 9 Tips for a Successful Deployment
Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the most from a SIEM solution. In this blog post, we’ll look at what a SIEM tool can deliver for customers, how to get the most out of your SIEM deployment, and how Varonis can complement your SIEM tools.
Robert Grimmick
7 min read
-
Data Security
Jun 21, 2021
Azure Bicep: Getting Started and How-To Guide
Are you deploying resources to Azure and trying to use Azure Resource Manager (ARM) templates? Are you finding the JSON syntax confusing? Microsoft heard the criticism and introduced a new infrastructure as a code project called Azure Bicep.
Jeff Brown
10 min read
-
Data Security
Jun 17, 2021
Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX
Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims to give network engineers some visibility into the vast amounts of traffic that cross our wired and wireless connections every day. In this blog post, we’ll explore what network flow monitoring is and how it’s used to keep traffic flowing smoothly and securely. We’ll also look at three of the most popular flow monitoring technologies.
Robert Grimmick
7 min read
-
Active Directory Data Security
Jun 14, 2021
How to Create an Azure Virtual Network
Are you ready to move your data center to the cloud? You might be planning for things like identity, governance, and security, but one major topic is networking. How are you going to connect to the resources in the cloud? You’re going to need Azure Virtual Networks!
Jeff Brown
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital