Blog

Data Security

Ransomware Meets Its Match With Automated Cyber Defenses

Michael Buckbee

Michael Buckbee

The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...

Insider Threats: Stealthy Password Hacking With Smbexec   

Michael Buckbee

Michael Buckbee

As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...

Americans and Privacy Concerns: Who Do We Trust?

Rob Sobers

Rob Sobers

Who do Americans trust with their personal information? We surveyed 1,000 people to see who America puts their trist in the most.

Varonis DataPrivilege and RSA® Identity Governance and Lifecycle

Michael Buckbee

Michael Buckbee

We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint.  This Implementation Blueprint will help the business to quickly detect security...

2019 Data Risk Report Stats and Tips You Won’t Want to Miss

Rob Sobers

Rob Sobers

Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

Michael Buckbee

Michael Buckbee

Microsoft changed their guidance on permissions expiration policies. Should you change yours?

How to Use Microsoft Teams Safely: Security and Compliance Basics

Michael Buckbee

Michael Buckbee

Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks

Right to be Forgotten: Explained

Michael Buckbee

Michael Buckbee

Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.

Adventures in Fileless Malware, Part V: More DDE and COM Scriplets

Michael Buckbee

Michael Buckbee

In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...

Adventures in Fileless Malware, Part I

Michael Buckbee

Michael Buckbee

When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...

How to Discover GDPR Data With Varonis

Michael Buckbee

Michael Buckbee

GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...

What is Identity Access Management?

Michael Buckbee

Michael Buckbee

Identity and Access Management is a critical function for enterprises to control and monitor in order to safeguard all their data, systems, and people

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.