Blog

Data Security

12 Most Disregarded Cybersecurity Tasks

Rob Sobers

Rob Sobers

It is important that cybersecurity be prioritized by every level of individual in an organization. We're going over tips to follow to manage risk today.

What is OSINT?

Kody Kinzie

Kody Kinzie

Open source intelligence is often utilized by hackers and red teams to leverage public data while conducting investigations, often using database searches.

What is a Rootkit? How Can You Detect it?

Michael Buckbee

Michael Buckbee

Think there might be a chance you caught a rootkit virus? Learn more about these toolboxes of the malware world and just how to detect them with our guide. 

Is Your Biggest Security Threat Already Inside Your Organization?

Rob Sobers

Rob Sobers

Is your company protected against insider threats? From malicious ex-employees to negligent staff, your biggest cybersecurity concern may already be inside.

Ransomware Meets Its Match With Automated Cyber Defenses

Michael Buckbee

Michael Buckbee

The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...

Insider Threats: Stealthy Password Hacking With Smbexec   

Michael Buckbee

Michael Buckbee

As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...

Americans and Privacy Concerns: Who Do We Trust?

Rob Sobers

Rob Sobers

Who do Americans trust with their personal information? We surveyed 1,000 people to see who America puts their trist in the most.

Varonis DataPrivilege and RSA® Identity Governance and Lifecycle

Michael Buckbee

Michael Buckbee

We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint.  This Implementation Blueprint will help the business to quickly detect security...

2019 Data Risk Report Stats and Tips You Won’t Want to Miss

Rob Sobers

Rob Sobers

Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

Michael Buckbee

Michael Buckbee

Microsoft changed their guidance on permissions expiration policies. Should you change yours?

How to Use Microsoft Teams Safely: Security and Compliance Basics

Michael Buckbee

Michael Buckbee

Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks

Right to be Forgotten: Explained

Michael Buckbee

Michael Buckbee

Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.