Blog

Data Security

What is Two-Factor Authentication (2FA) and Why Should You Use It?

Josue Ledesma

Josue Ledesma

Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.

What is Threat Modeling and How To Choose the Right Framework

Josue Ledesma

Josue Ledesma

Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.

Last Week in Ransomware: Week of July 26th

Michael Raymond

Michael Raymond

This week REvil Ransomware had a universal decryption key appear out of thin air and the US has accused China of ProxyLogon.

What is a Brute Force Attack?

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.

Last Week in Ransomware: Week of July 19th

Michael Raymond

Michael Raymond

This past week hasn't seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.

Data Migration Guide: Strategy Success & Best Practices

Michael Buckbee

Michael Buckbee

Wondering what you need to know about data migration? Our guide to success will provide you with all the information you're looking for! 

Everything You Need to Know About Cyber Liability Insurance

Josue Ledesma

Josue Ledesma

Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity…

Last Week in Ransomware: Week of July 5th

Michael Raymond

Michael Raymond

Ransomware in the News Before we get to the major ransomware attack that occurred over the holiday weekend, let’s take a look at some of the other stories from the...

Magnifine glass shows it overlooking someones information, conveying the importance of data security

What is Data Security?: Definition, Explanation and Guide

Nolan Necoechea

Nolan Necoechea

Learn more about data security, why it’s important, and how you can protect your most valuable – and vulnerable – asset with Varonis.

Your Guide to Salesforce Data Protection

Renganathan Padmanabhan

Renganathan Padmanabhan

That is the approximate cost of a data breach on any business worldwide in 2020. The number increases to 8.64 million dollars in expenses in the United States alone. Let…

ReConnect - Meet DatAdvantage Cloud

Kilian Englert

Kilian Englert

Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!

Last Week in Ransomware: Week of June 28th

Michael Raymond

Michael Raymond

Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.