-
Data Security PowerShell
Mar 29, 2020
PowerShell Obfuscation: Stealth Through Confusion, Part II
This article is part of the series "PowerShell Obfuscation". Check out the rest: PowerShell Obfuscation: Stealth Through Confusion, Part I PowerShell Obfuscation: Stealth Through Confusion, Part II
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Data Security 2017: We’re All Hacked
Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there was more than a few of us left — consumers and companies — who could say that security incidents did not have a direct impact.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
Do Americans Ever Change Their Passwords?
Just how cautious are Americans when it comes to cybersecurity?
Rob Sobers
2 min read
-
Data Security
Mar 29, 2020
A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable
Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell, there are five major moments where data is most vulnerable: collection, storage, sharing, analysis, and deletion. These vulnerability points increase the risk of a data breach – and we’ve all heard about the costs of having one.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
The Likelihood of a Cyber Attack Compared
While the cost of a cyber attack is often discussed, we seldom hear about just how common these attacks actually are. Numerous security experts believe that a cyber attack or breach of catastrophic proportions is no longer a matter of if, but a matter of when.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files
If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find?
Rachel Hunt
1 min read
-
Data Security
Mar 29, 2020
Solving The Cybersecurity Skills Shortage Within Your Organization
It’s simple economics: supply and demand.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
The World’s Most Creative Data Centers: Infographic
Data centers are facilities used to house computer systems and associated components. They are vital to the daily operations of a network and are home to it’s most pivotal systems and equipment. Sound glamorous? Actually, it is.
Rob Sobers
1 min read
-
Data Security Security Bulletins
Mar 29, 2020
Varonis DatAlert and IBM QRadar
Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Best Practices for SharePoint Permissioning
SharePoint is Microsoft’s enterprise-class environment for sharing content: documents, presentations, spreadsheets, notes, images, and more. While SharePoint has many advantages over a raw file system in terms of content management, access to the content still has to be permissioned.
Jonathan Pistilli
4 min read
-
Security Bulletins
Mar 29, 2020
Data Classification Labels: Integrating with Microsoft Information Protection (MIP)
We’re thrilled to announce the beta release of Data Classification Labels: integrating with Microsoft Information Protection (MIP) to enable users to better track and secure sensitive files across enterprise data stores.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Automating Permissions Cleanup: An In-Depth ROI Analysis
Implementing a least privilege model can be time-consuming and expensive, but important in any data security strategy. The Varonis Automation Engine helps you automate the process, and drastically reduces the time required get there. Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding and fixing global access–a task which can drastically reduce the risk of data leaks and security breaches.
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital