Blog

Cloud Security

What is IDOR (Insecure Direct Object Reference)?

Robert Grimmick

Robert Grimmick

Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.

SaaS Risk Report Reveals Exposed Cloud Data is a $28M Risk for Typical Company

Rachel Hunt

Rachel Hunt

The Great SaaS Data Exposure examines the challenge CISOs face in protecting data across a growing portfolio of SaaS apps and services such as Microsoft 365.

Change These 7 Security Settings After Creating a New AWS Account

Shane Waterford

Shane Waterford

Use these seven AWS security best practices for simple configuration changes on a new AWS account.

How to Create S3 Buckets in AWS with CloudFormation: Step-by-Step Guide

Shane Waterford

Shane Waterford

Use AWS CloudFormation to create resources such as S3 buckets. Infrastructure as code enables a repeatable, reliable deployment process. Learn more here.

Introduction to AWS DevOps: Skills + Tools You Need

Meenakshi Kasi

Meenakshi Kasi

Amazon Web Services has capabilities that help you accelerate Devops journey. In this article, we discuss the AWS tools, architecture and how they help organizations increase the ability to deliver and deploy applications at high velocity and better quality.

How to Set Up AWS IAM: Elements, Features, & Components

Meenakshi Kasi

Meenakshi Kasi

Amazon Web Services (AWS) Identity and Access Management (IAM) is a web service that helps you securely control access to AWS. In this article, we will learn to plan, setup IAM to control who is authenticated (signed in) and authorized (has permissions) to use these resources.

1 2

Next

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.