Data Security
Ransomware Meets Its Match With Automated Cyber Defenses
Jun 17, 2020
The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...
Insider Threats: Stealthy Password Hacking With Smbexec
Jun 17, 2020
As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...
Americans and Privacy Concerns: Who Do We Trust?
Jun 17, 2020
Who do Americans trust with their personal information? We surveyed 1,000 people to see who America puts their trist in the most.
Varonis DataPrivilege and RSA® Identity Governance and Lifecycle
Jun 17, 2020
We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint. This Implementation Blueprint will help the business to quickly detect security...
2019 Data Risk Report Stats and Tips You Won’t Want to Miss
Jun 17, 2020
Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices
Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?
Jun 17, 2020
Microsoft changed their guidance on permissions expiration policies. Should you change yours?
How to Use Microsoft Teams Safely: Security and Compliance Basics
Jun 17, 2020
Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks
Right to be Forgotten: Explained
Jun 17, 2020
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Adventures in Fileless Malware, Part V: More DDE and COM Scriplets
Jun 17, 2020
In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...
Adventures in Fileless Malware, Part I
Jun 17, 2020
When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...
How to Discover GDPR Data With Varonis
Jun 17, 2020
GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...
What is Identity Access Management?
Jun 17, 2020
Identity and Access Management is a critical function for enterprises to control and monitor in order to safeguard all their data, systems, and people
Try Varonis free.
Deploys in minutes.