Blog

Data Security

5 Priorities for the CISO Budget In 2021

Michael Buckbee

Michael Buckbee

Here the top 5 security and compliance trends for 2021. Be the prepared CISO with a budget for these top priorities in data security and compliance.

What is a Port Scanner and How Does it Work?

Michael Buckbee

Michael Buckbee

Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.

What is Role-Based Access Control (RBAC)?

Michael Buckbee

Michael Buckbee

Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we’ll explain what RBAC is, and how to implement it.

Netwalker Ransomware Guide: Everything You Need to Know

Nathan Coppinger

Nathan Coppinger

Ransomware has been on the rise. The Netwalker ransomware has begun a widespread attack campaign, and everyone should know how to defend themselves

The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files

Rachel Hunt

Rachel Hunt

Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...

Finding Data Owners with Varonis

Michael Buckbee

Michael Buckbee

Figuring out who should have access to folders is complicated. Varonis has a tested methodology that helps organizations get to the least privileged permissions.

What is an Incident Response Plan and How to Create One

Neil Fox

Neil Fox

We'll cover what an incident response plan is, why you need one, how to create one, who executes it and the six steps to create your own plan.

Watch: Varonis ReConnect!

Rachel Hunt

Rachel Hunt

Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...

What is DNS Tunneling? A Detection Guide

Michael Buckbee

Michael Buckbee

Domain Name System (DNS) tunneling is a prevalent hacking method — learn how it works, the types of threats and how to detect and combat them

How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests

Michael Buckbee

Michael Buckbee

Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...

How Varonis Helps Stop Emotet

Rob Sobers

Rob Sobers

Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.

Data Privacy Guide: Definitions, Explanations and Legislation

Michael Buckbee

Michael Buckbee

Data privacy is all about keeping your data safe and private. In this guide you’ll learn why it’s important, and the best methods to achieve it.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.