Blog

Data Security

How to Monitor Network Traffic: Effective Steps & Tips

David Harrington

David Harrington

In this article, you will learn how to monitor network traffic using different tools and methods.

What is Role-Based Access Control (RBAC)?

Neeraj Kumar

Neeraj Kumar

Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we'll explain what RBAC is, and how to implement it.

What is a Security Operations Center (SOC)?

David Harrington

David Harrington

What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.

INVEST in America Act: Billion-Dollar Funding for Cybersecurity

Nathan Coppinger

Nathan Coppinger

The INVEST in America Act provides nearly two billion dollars in funding to enhance the nation's cybersecurity. Who should care? State, local, and tribal governments. $1 billion in funding over...

Cloud Applications Put Your Data At Risk - Here's How To Regain Control

Yaki Faitelson

Yaki Faitelson

Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...

Salesforce Security: 5 Ways Your Data Could be Exposed

Avia Navickas

Avia Navickas

Salesforce is the lifeblood of many organizations - Here are five things you should know about your Salesforce security and how to effectively reduce risk

Update 62 - SaaS Authentication Monitoring Evasion

Kilian Englert

Kilian Englert

Businesses know they need to monitor their SaaS apps, but it's easy to get lulled into a false sense of security if you're relying on authentication monitoring as your only line of defense.

The MITRE ATT&CK Framework: A Comprehensive Guide

David Harrington

David Harrington

The MITRE ATT&CK framework helps businesses discover which hacker techniques, tactics, and behaviors they're most vulnerable to. Read about how to use ATT&CK for penetration testing within your organization today.

Abusing Misconfigured Salesforce Communities for Recon and Data Theft

Nitay Bachrach

Nitay Bachrach

Our research team has discovered numerous publicly accessible Salesforce Communities that are misconfigured and expose sensitive information.

ReConnect - Tackling SaaS Security

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team answer audience questions from the Virtual Connect event about how the CISO of a global communications firm approaches cloud security and minimizes risk across a wide variety of cloud platforms.

Password Spraying: What to Do and Prevention Tips

David Harrington

David Harrington

Using common or overly simplistic passwords can make users and organizations vulnerable to password spraying. Learn what password spraying attacks are, how they work, and what you can do to prevent one.

gMSA Guide: Group Managed Service Account Security & Deployment

Josue Ledesma

Josue Ledesma

Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.