-
AI Security Cloud Security Data Security Salesforce
Feb 11, 2025
3 Steps to Get Ready for Agentforce
In late 2024, Salesforce introduced Agentforce, a platform that allows businesses to easily build and deploy autonomous AI agents to automate business processes using Salesforce tools like Workflows, Apex code, and Flows. These AI agents can connect to enterprise data and take actions across sales, service, marketing, commerce, and other functions.
Eugene Feldman
4 min read
-
Cloud Security Ransomware
Jan 28, 2025
Ransomware Targets AWS S3 Buckets: How to Prevent Encryption Without Recovery
A new ransomware threat, known as Codefinger, is targeting users of AWS S3 Buckets.
Daniel Miller
2 min read
-
Cloud Security Data Security
Jan 21, 2025
Varonis Once Again Named a Leader in GigaOm Radar for Data Security Platforms
Varonis is proud to be named a Leader in the GigaOm Radar for Data Security Platforms for the second year in a row. As data volumes grow, environments become more complex, and AI introduces data risk, enterprises increasingly turn to Data Security Platforms.
Nolan Necoechea
2 min read
-
Cloud Security
Jan 15, 2025
Change These 7 Security Settings After Creating a New AWS Account
If you’ve just created your Amazon Web Services (AWS) account and are worried about AWS data security, you’re not alone.
Lexi Croisdale
8 min read
-
Cloud Security
Jan 02, 2025
What is S3 Bucket Namesquatting, and How Do You Prevent It?
With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One commonly overlooked area is the naming of S3 buckets. AWS S3 bucket names are global with predictable names that can be exploited by bad actors seeking to access or hijack S3 buckets. This is known as “S3 bucket namesquatting.”
Nolan Necoechea
3 min read
-
Cloud Security
Dec 16, 2024
Implementing AWS Resource Control Policies: Key Features and Benefits
AWS recently introduced Resource Control Policies (RCPs), enhancing their tools for access management and cloud security. RCPs allow organizations to centrally enforce data perimeters across their AWS environment, improving control over resource access.
Dubie Dubendorfer
2 min read
-
Cloud Security Data Security
Dec 16, 2024
AWS vs Azure vs Google: Cloud Services Comparison
In today’s digital world, adopting cloud technology is essential for businesses to stay competitive and agile. The cloud offers a wide array of benefits, including scalability, cost-efficiency, and access to cutting-edge technologies.
Dubie Dubendorfer
6 min read
-
Cloud Security Varonis Products
Dec 12, 2024
Introducing Varonis for ServiceNow
We’re excited to announce that Varonis' industry-leading Data Security Platform now protects ServiceNow. This expansion enables ServiceNow customers to secure their sensitive data, prevent data breaches, and comply with data regulations.
Nolan Necoechea
2 min read
-
Cloud Security Varonis Products
Nov 20, 2024
Introducing Varonis for Google Cloud
Today's cloud environments offer unparalleled flexibility and scalability, enabling rapid application development, testing, and deployment. However, this flexibility comes with challenges for security teams. Data is perpetually expanding, managed by various individuals outside of security, making it difficult to defend. As organizations' attack surfaces expand, the associated risks to data, such as overprivileged entitlements and misconfigurations, also increase.
Ellen Wilson
2 min read
-
Cloud Security Varonis Products
Nov 13, 2024
Varonis Extends Industry-Leading Cloud Data Security to Azure Databases
Varonis’ latest update extends its industry-leading cloud data security capabilities to managed Azure databases, including MSSQL, MongoDB, CosmosDB, MySQL, PostgreSQL, and numerous unmanaged databases.
Nathan Coppinger
2 min read
-
Cloud Security
Sep 30, 2024
Breaks in the Cloud: Protecting Against Top LLM Risks
Modern technology relies heavily on the cloud, and as companies migrate to SaaS, they increasingly use advanced features and tools like generative AI.
Megan Garza
3 min read
-
Cloud Security
Aug 22, 2024
AWS Misconfigurations Lead to Exposed Data
Early this week it was discovered that AWS environments had been compromised through exposed .env files. Unit 42 researchers discovered a data extortion campaign that exposed files containing AWS access keys, credentials for databases and social media accounts, API keys for SaaS applications and email services, as well as access tokens for a variety of cloud services. Around 110,000 domains were affected, leading to the potential exposure of over 90,000 unique environment variables with 7,000 corresponding to cloud services used by organizations. What does this mean? If you rely on AWS, now's a great time to ensure your configurations are secure, permissions are right-sized, and you’re monitoring for abnormal activity.
Varonis Threat Labs
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital