Blog

Cloud Security

Varonis for AWS

Implementing AWS Resource Control Policies: Key Features and Benefits

Dubie Dubendorfer

Dubie Dubendorfer

AWS' new Resource Control Policies (RCPs) aim to improve control over resource access. However, organizations should approach implementation with caution.

AWS, Azure, Google

AWS vs Azure vs Google: Cloud Services Comparison

Dubie Dubendorfer

Dubie Dubendorfer

This AWS vs Azure vs Google comparison evaluates these public cloud providers including pricing, computing, storage and other features.

Varonis for ServiceNow

Introducing Varonis for ServiceNow

Nolan Necoechea

Nolan Necoechea

Varonis now supports ServiceNow, enabling ServiceNow customers to secure their sensitive data, prevent breaches, and comply with regulations.

Varonis for Google Cloud

Introducing Varonis for Google Cloud

Ellen Wilson

Ellen Wilson

Varonis’ support for Google Cloud brings a unified and automated data security approach to major cloud providers.

Azure Databases

Varonis Extends Industry-Leading Cloud Data Security to Azure Databases

Nathan Coppinger

Nathan Coppinger

Discover and protect critical data stored in Azure databases with Varonis' industry-leading cloud data security.

Cloud image with warning symbols and alerts in Copilot, a LLM and AI related tool

Breaks in the Cloud: Protecting Against Top LLM Risks

Megan Garza

Megan Garza

Understand the risk of Large Language Models (LLMs) to your cloud security and why it's important to be cautious when adopting new technologies.

AWS Misconfigurations Lead to Data Exposure

AWS Misconfigurations Lead to Exposed Data

Varonis Threat Labs

Varonis Threat Labs

Discover how a recent data extortion campaign exposed sensitive files in thousands of AWS environments and what you can do to prevent it from happening to you.

Without automation, cloud data security doesn't stand a chance.

Cloud Security Essentials: The Case for Automated DSPM

Nolan Necoechea

Nolan Necoechea

Data security posture management (DSPM) has emerged as a standard for securing sensitive data in the cloud and other environments. However, without automation, DSPM doesn’t stand a chance. Automation is crucial to overcoming the challenges of securing data in the cloud.

Understanding and Applying the Shared Responsibility Model at Your Organization

Tristan Grush

Tristan Grush

To avoid significant security gaps and risks to sensitive data, organizations need to understand the shared responsibility model used by many SaaS providers.

CSPM and DSPM overview

DSPM vs. CSPM Solutions: Bridging Data and Cloud Security With Varonis

Nathan Coppinger

Nathan Coppinger

Explore the essential roles of DSPM and CSPM solutions, and see how Varonis uniquely enables you to bridge the gap between cloud and data security. 

cloud being protected

How to Protect Your Cloud Environment From Today’s Top 5 Threats

Lexi Croisdale

Lexi Croisdale

Learn the top five cloud threats after your sensitive data and how to protect your organization from them.

Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe

Yaki Faitelson

Yaki Faitelson

This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.