Data Security
12 Most Disregarded Cybersecurity Tasks
Jun 17, 2020
It is important that cybersecurity be prioritized by every level of individual in an organization. We're going over tips to follow to manage risk today.
What is OSINT?
Jun 17, 2020
Open source intelligence is often utilized by hackers and red teams to leverage public data while conducting investigations, often using database searches.
What is a Rootkit? How Can You Detect it?
Jun 17, 2020
Think there might be a chance you caught a rootkit virus? Learn more about these toolboxes of the malware world and just how to detect them with our guide.
Is Your Biggest Security Threat Already Inside Your Organization?
Jun 17, 2020
Is your company protected against insider threats? From malicious ex-employees to negligent staff, your biggest cybersecurity concern may already be inside.
Ransomware Meets Its Match With Automated Cyber Defenses
Jun 17, 2020
The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...
Insider Threats: Stealthy Password Hacking With Smbexec
Jun 17, 2020
As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...
Americans and Privacy Concerns: Who Do We Trust?
Jun 17, 2020
Who do Americans trust with their personal information? We surveyed 1,000 people to see who America puts their trist in the most.
Varonis DataPrivilege and RSA® Identity Governance and Lifecycle
Jun 17, 2020
We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint. This Implementation Blueprint will help the business to quickly detect security...
2019 Data Risk Report Stats and Tips You Won’t Want to Miss
Jun 17, 2020
Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices
Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?
Jun 17, 2020
Microsoft changed their guidance on permissions expiration policies. Should you change yours?
How to Use Microsoft Teams Safely: Security and Compliance Basics
Jun 17, 2020
Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks
Right to be Forgotten: Explained
Jun 17, 2020
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Try Varonis free.
Deploys in minutes.