Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Mar 29, 2020
Varonis Version 7.0
Version 7.0 of the Varonis Data Security Platform is here – featuring new cloud support and advanced threat detection and response capabilities: new event sources and enrichment; out-of-the-box threat intelligence applied to...
Michael Buckbee
2 min read
-
Data Security
Mar 29, 2020
Hacker Motives: Red Flags and Prevention
Hacker are motivated by different things to compromise your data. See what patterns hackers have been following and how you can keep your company safe.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
What is a Whaling Attack?
A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Kerberos Attack: How to Stop Golden Tickets?
The Golden Ticket Attack, discovered by security researcher Benjamin Delpy, gives an attacker total and complete access to your entire domain. It’s a Golden Ticket (just like in Willy Wonka)...
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
What is CDM and How Does Varonis Help?
The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
What is an IT Security Audit? The Basics
Security audits are crucial to maintaining effective securilty policies and practices — learn best practices, audit types and what to look for in an audit
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
What is DCOM (Distributed Component Object Model)?
DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
Protect Your Data With Super Easy File Security Tricks!
But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Social Media Security: How Safe is Your Information?
What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!
Rob Sobers
2 min read
-
Active Directory
Mar 29, 2020
How to Run an Active Directory Audit Using Varonis
AD is a primary target for attackers. Read on to learn how to use Varonis to discover vulnerabilities and remediate risk in an Active Directory audit.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
What is an Advanced Persistent Threat (APT)?
An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more
Michael Buckbee
4 min read
-
Privacy & Compliance
Mar 29, 2020
NYS SHIELD Act: Updates to PII, Data Security, and Breach Notification
After the devastating Equifax incident, the New York State legislature introduced the Stop Hacks and Improve Electronic Data Security or SHIELD Act in order to update the existing breach rules....
Michael Buckbee
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital