Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Mar 29, 2020
Are These 10 Cybersecurity Myths Putting Your Business at Risk?
From the myth of strong passwords to misconceptions surrounding which businesses hackers target and why, there are a number of cybersecurity misunderstandings that could be putting your business at risk of attack. Are you or your employees falling for them?
Rob Sobers
4 min read
-
Data Security
Mar 29, 2020
Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors
Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
What is a DDoS Attack? Identifying Denial-of-Service Attacks
Distributed Denial-of-service (DDoS) attacks are disruptive and costly. Learn more about DDoS attacks and how you can better protect your network.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Varonis Gets Lightning Fast with Solr
Any security practitioner that has had to perform forensic analysis on a cybersecurity incident likely describes the process as “searching for a needle in a stack of needles.” Even Tony...
Michael Buckbee
2 min read
-
Security Bulletins
Mar 29, 2020
64% of Americans Don’t Know What to Do After a Data Breach — Do You? (Survey)
We surveyed Americans to gauge their data breach literacy including awareness and how to respond — see how you data breach literacy stacks up.
Rob Sobers
5 min read
-
Data Security
Mar 29, 2020
Browsing Anonymously: Is It Really Anonymous?
What can tools like private browsing and VPNs really deliver in terms of privacy? See for yourself as we take a deep dive into popular privacy tools
Michael Buckbee
5 min read
-
Active Directory
Mar 29, 2020
Active Directory Migration Tool (ADMT): Your Essential Guide
The Active Directory Migration Tool is a Microsoft tool that makes it easy to move AD objects to other domains or forests. Read on to learn how to use ADMT.
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
How to Turn Cybersecurity Jargon into a Language Everyone in Your Office Can Speak
Cybersecurity jargon can be confusing, but it's imperative that every member of your organization — not just the IT department — understands what they mean. In this article, we explain how to translate 10 cybersecurity buzzwords for everyone in your office.
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers
While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi...
Kody Kinzie
10 min read
-
Data Security
Mar 29, 2020
Security Risk Analysis Is Different From Risk Assessment
At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
58% of organizations have more than 100,000 folders open to all employees
Like a wardrobe malfunction during a live broadcast, no one wants to be overexposed – especially when it comes to your data. The surprising truth: most companies go about their...
Rachel Hunt
1 min read
-
Data Security
Mar 29, 2020
Analyzing Company Reputation After a Data Breach
Does a data breach affect how your customers see you? Take a look at what Americans think as we dive into the relationship between breaches and reputation.
Michael Buckbee
9 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital