Featured Content

Data Security

Avia Navickas

Avia Navickas
Cloud Security

Yaki Faitelson
Data Security

Varonis Threat Labs
Data Security
-1.png)
Lexi Croisdale
-
Data Security
Mar 29, 2020
What Would The World’s Data Look Like if it Were Physical?
Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
Why A Honeypot Is Not A Comprehensive Security Solution
A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
What is Metasploit? The Beginner's Guide
This Ruby-based open-source framework, Metasploit, allows testing via command line alterations or GUI. Learn more with our beginner's guide today.
Michael Buckbee
6 min read
-
Data Security
Mar 26, 2020
COVID-19 Threat Update #2
The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices. It only takes one compromised remote...
Kilian Englert
1 min read
-
Data Security Security Bulletins Threat Research
Mar 19, 2020
COVID-19 Threat Update #1
Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...
Kilian Englert
1 min read
-
Threat Research
Feb 05, 2020
Varonis Uncovers New Malware Strains and a Mysterious Web Shell During a Monero Crypto Jacking Investigation
The Varonis Security Research team recently investigated an ongoing cryptomining infection that had spread to nearly every device at a mid-size company. Analysis of the collected malware samples revealed a...
Dolev Taler
9 min read
-
Security Bulletins Threat Research
Jan 27, 2020
Varonis Uncovers Another New Strain of the Qbot Banking Malware
Varonis has discovered and reverse engineered another new strain of Qbot, a sophisticated, well-known type of malware that collects sensitive data, such as browser cookies, digital certificate information, keystrokes, credentials, and session data from its victims to commit financial fraud.
Dolev Taler
2 min read
-
Data Security
Oct 24, 2019
What is Data Loss Prevention (DLP)?
Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.
Nolan Necoechea
4 min read
-
Data Security PowerShell Security Bulletins
Oct 17, 2019
What is Endpoint Security? A Complete Guide
Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.
Michael Buckbee
7 min read
-
Data Security
Oct 17, 2019
Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget
Celebrate cybersecurity awareness year-round with these cybersecurity memo templates and attention-grabbing flyers that promote awareness and best practices
Rob Sobers
7 min read
-
Data Security
Oct 15, 2019
How Hackers Use OSINT to Find Business Data
OSINT can be a valuible resource for finding business data, if you know where to look. Here are the best sources of OSINT for business info in 2019.
Kody Kinzie
8 min read
-
Data Security Security Bulletins
Oct 02, 2019
What is a Security Operations Center (SOC)?
Learn how a security operations center (SOC) functions in an enterprise, SOC models, job roles, best practices and the value it brings to an organization
Michael Buckbee
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital