Blog

Data Security

12 TED Talks That Will Change the Way You Look at Business Cybersecurity

Rob Sobers

Rob Sobers

The world of business cybersecurity is always changing. Stay on top of trends and ahead of threats with our 12 favorite cybersecurity TED talks.

8 Events That Changed Cybersecurity Forever

Michael Buckbee

Michael Buckbee

Milestone incidents are what made cybersecurity what it is today - these are the top 8 events that changed cybersecurity, and why they (still) matter.

Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!

Michael Buckbee

Michael Buckbee

Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the...

Artificial Intelligence vs. Machine Learning in Cybersecurity

Rob Sobers

Rob Sobers

This guide compares artificial intelligence (AI), machine learning (ML) and deep learning (DL) and their roles in current and future cybersecurity practices

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Michael Buckbee

Michael Buckbee

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Kerberos Authentication Explained

Michael Buckbee

Michael Buckbee

Learn more about Kerberos Authentication, the widely-used authorization technology. Contact us today to learn how Varonis monitors Kerberos, and more.

9 Infamous APT Groups: Fast Fact Trading Cards

Rob Sobers

Rob Sobers

APT groups consist of capable and elusive members who wreak havoc on their targets — learn about infamous APT groups and their MOs through “trading cards”

The Difference Between E3 and E5 Office365 Features

Michael Buckbee

Michael Buckbee

Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...

PowerShell Obfuscation: Stealth Through Confusion, Part II

Michael Buckbee

Michael Buckbee

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...

Data Security 2017: We’re All Hacked

Michael Buckbee

Michael Buckbee

Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there...

Do Americans Ever Change Their Passwords?

Rob Sobers

Rob Sobers

Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017...

A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable

Michael Buckbee

Michael Buckbee

Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.