-
Data Security
Dec 23, 2020
Phishing Attacks: Types, Prevention, and Examples
Phishing attacks use fraud to trick users into revealing information or opening malware. They are a popular attack technique among many types of threat actors.
Robert Grimmick
9 min read
-
Data Security Privacy & Compliance
Dec 22, 2020
5 Priorities for the CISO Budget In 2021
Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.
Michael Buckbee
8 min read
-
Threat Research
Dec 18, 2020
SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign
Learn how detect and defend against the SolarWinds Sunburst malware that has compromised versions of SolarWinds’ Orion solution
Snir Ben Shimol
6 min read
-
PowerShell
Dec 03, 2020
How to Connect to Office 365 PowerShell: Azure AD Modules
Connecting PowerShell to Office 365 makes management easier, more productive, and can unlock hidden features. In this guide, we’ll show you how.
Jeff Brown
7 min read
-
Threat Research
Dec 02, 2020
November 2020 Malware Trends Report
This Malware Trends Report November 2020 is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
4 min read
-
Data Security
Nov 23, 2020
What is a Port Scanner and How Does it Work?
Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.
Michael Buckbee
7 min read
-
Data Security
Nov 23, 2020
What is Role-Based Access Control (RBAC)?
Role-based access control is a framework for granting end users access to systems, applications, and data based on their designated roles in IaaS environments.
Daniel Miller
4 min read
-
Data Security
Nov 17, 2020
Netwalker Ransomware Guide: Everything You Need to Know
Ransomware has been on the rise. The Netwalker ransomware has begun a widespread attack campaign, and everyone should know how to defend themselves
Nathan Coppinger
7 min read
-
Data Security
Nov 16, 2020
The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files
Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...
Rachel Hunt
1 min read
-
Data Security
Nov 13, 2020
Finding Data Owners with Varonis
Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.
Michael Buckbee
4 min read
-
Data Security
Nov 11, 2020
What is an Incident Response Plan and How to Create One
We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.
Neil Fox
10 min read
-
Security Bulletins
Nov 02, 2020
October 2020 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital