Blog

Data Security

GDPR Requirements in Plain English

Michael Buckbee

Michael Buckbee

You just want to answer the question: “What do I need to do for GDPR?” Maybe you've worked your way through a few online quizzes to test for GDPR readiness or skimmed an article that made some vague suggestions. Learn the GDPR requirements.

24 Essential Penetration Testing Tools in 2020

Michael Buckbee

Michael Buckbee

A collection of the top penetration testing tools along with their best uses and supported platforms to help you find the pentesting tool you need.

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Michael Buckbee

Michael Buckbee

Achieving compliance with HIPAA, PCI, GDPR, and CCPA regulations in your Azure system can be complex. In this guide, we’ll show you how.

COVID-19 Threat Update #6

Kilian Englert

Kilian Englert

Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...

COVID-19 Threat Update #5

Kilian Englert

Kilian Englert

The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...

Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials

Eric Saraga

Eric Saraga

We created a proof-of-concept that manipulates the Azure authentication function to give us a ‘skeleton key’ password that will work for all users, and dump all real clear-text usernames and passwords into a file.

Hackers Take Aim at Home WiFi Networks

Rachel Hunt

Rachel Hunt

Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...

What is PGP Encryption and How Does It Work?

Michael Buckbee

Michael Buckbee

PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it

COVID-19 THREAT UPDATE #4

Kilian Englert

Kilian Englert

Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...

What is Fileless Malware? PowerShell Exploited

Michael Buckbee

Michael Buckbee

Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.

Top 5 Remote Work Security Threats

Michael Buckbee

Michael Buckbee

COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.

COVID-19 Threat Update #3

Kilian Englert

Kilian Englert

If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.