Blog

Cloud Security

AWS logo around a lock and chain to showcase security best practices

Change These 7 Security Settings After Creating a New AWS Account

Lexi Croisdale

Lexi Croisdale

Take these immediate actions to enhance your security posture significantly when creating a new AWS account.

AWS S3 namesquatting

What is S3 Bucket Namesquatting, and How Do You Prevent It?

Nolan Necoechea

Nolan Necoechea

This blog examines AWS S3 bucket namesquatting, methods to address the issue, and how Varonis can prevent this and other data security problems in AWS.

Varonis for AWS

Implementing AWS Resource Control Policies: Key Features and Benefits

Dubie Dubendorfer

Dubie Dubendorfer

AWS' new Resource Control Policies (RCPs) aim to improve control over resource access. However, organizations should approach implementation with caution.

AWS, Azure, Google

AWS vs Azure vs Google: Cloud Services Comparison

Dubie Dubendorfer

Dubie Dubendorfer

This AWS vs Azure vs Google comparison evaluates these public cloud providers including pricing, computing, storage and other features.

Varonis for ServiceNow

Introducing Varonis for ServiceNow

Nolan Necoechea

Nolan Necoechea

Varonis now supports ServiceNow, enabling ServiceNow customers to secure their sensitive data, prevent breaches, and comply with regulations.

Varonis for Google Cloud

Introducing Varonis for Google Cloud

Ellen Wilson

Ellen Wilson

Varonis’ support for Google Cloud brings a unified and automated data security approach to major cloud providers.

Azure Databases

Varonis Extends Industry-Leading Cloud Data Security to Azure Databases

Nathan Coppinger

Nathan Coppinger

Discover and protect critical data stored in Azure databases with Varonis' industry-leading cloud data security.

Cloud image with warning symbols and alerts in Copilot, a LLM and AI related tool

Breaks in the Cloud: Protecting Against Top LLM Risks

Megan Garza

Megan Garza

Understand the risk of Large Language Models (LLMs) to your cloud security and why it's important to be cautious when adopting new technologies.

AWS Misconfigurations Lead to Data Exposure

AWS Misconfigurations Lead to Exposed Data

Varonis Threat Labs

Varonis Threat Labs

Discover how a recent data extortion campaign exposed sensitive files in thousands of AWS environments and what you can do to prevent it from happening to you.

Without automation, cloud data security doesn't stand a chance.

Cloud Security Essentials: The Case for Automated DSPM

Nolan Necoechea

Nolan Necoechea

Data security posture management (DSPM) has emerged as a standard for securing sensitive data in the cloud and other environments. However, without automation, DSPM doesn’t stand a chance. Automation is crucial to overcoming the challenges of securing data in the cloud.

Understanding and Applying the Shared Responsibility Model at Your Organization

Tristan Grush

Tristan Grush

To avoid significant security gaps and risks to sensitive data, organizations need to understand the shared responsibility model used by many SaaS providers.

CSPM and DSPM overview

DSPM vs. CSPM Solutions: Bridging Data and Cloud Security With Varonis

Nathan Coppinger

Nathan Coppinger

Explore the essential roles of DSPM and CSPM solutions, and see how Varonis uniquely enables you to bridge the gap between cloud and data security. 

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.