Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security PowerShell
Mar 29, 2020
PowerShell Obfuscation: Stealth Through Confusion, Part II
Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Data Security 2017: We’re All Hacked
Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there...
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
Do Americans Ever Change Their Passwords?
Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017...
Rob Sobers
2 min read
-
Data Security
Mar 29, 2020
A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable
Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
The Likelihood of a Cyber Attack Compared
The chances of experiencing a cyber attack are higher than you'd think. Take a look as we compare the odds.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files
If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find? Every year, Varonis gives the world a behind-the-scenes...
Rachel Hunt
1 min read
-
Data Security
Mar 29, 2020
Solving The Cybersecurity Skills Shortage Within Your Organization
As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
The World’s Most Creative Data Centers: Infographic
Ever wonder where the world’s most established companies house their data centers? From facilities with roofs made up entirely of plants, to centers located in mines 22 stories below ground, here are the 10 most creative data centers in the world.
Rob Sobers
1 min read
-
Data Security Security Bulletins
Mar 29, 2020
Varonis DatAlert and IBM QRadar
Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar. The Varonis App for QRadar adds context and security analytics to simplify investigations, streamline threat detection, and build...
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Best Practices for SharePoint Permissioning
SharePoint is Microsoft’s enterprise-class environment for sharing content: documents, presentations, spreadsheets, notes, images, and more. While SharePoint has many advantages over a raw file system in terms of content management,...
Jonathan Pistilli
4 min read
-
Security Bulletins
Mar 29, 2020
Data Classification Labels: Integrating with Microsoft Information Protection (MIP)
We’re thrilled to announce the beta release of Data Classification Labels: integrating with Microsoft Information Protection (MIP) to enable users to better track and secure sensitive files across enterprise data...
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Automating Permissions Cleanup: An In-Depth ROI Analysis
Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...
Michael Buckbee
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital