Blog

Data Security

Kerberos Authentication Explained

Michael Buckbee

Michael Buckbee

Learn more about Kerberos Authentication, the widely-used authorization technology. Contact us today to learn how Varonis monitors Kerberos, and more.

9 Infamous APT Groups: Fast Fact Trading Cards

Rob Sobers

Rob Sobers

APT groups consist of capable and elusive members who wreak havoc on their targets — learn about infamous APT groups and their MOs through “trading cards”

The Difference Between E3 and E5 Office365 Features

Michael Buckbee

Michael Buckbee

Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...

PowerShell Obfuscation: Stealth Through Confusion, Part II

Michael Buckbee

Michael Buckbee

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...

Data Security 2017: We’re All Hacked

Michael Buckbee

Michael Buckbee

Remember more innocent times back in early 2017? Before Petya, WannaCry, leaked NSA vulnerabilities, Equifax, and Uber, the state of data security was anything but rosy, but I suppose there...

Do Americans Ever Change Their Passwords?

Rob Sobers

Rob Sobers

Just how cautious are Americans when it comes to cybersecurity? In today’s hyper-connected, highly-digitized society, data breaches are becoming increasingly commonplace. And they affect both corporations and individuals. In 2017...

A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable

Michael Buckbee

Michael Buckbee

Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...

The Likelihood of a Cyber Attack Compared

Rob Sobers

Rob Sobers

The chances of experiencing a cyber attack are higher than you'd think. Take a look as we compare the odds.

It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files

Rachel Hunt

Rachel Hunt

If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find? Every year, Varonis gives the world a behind-the-scenes...

Solving The Cybersecurity Skills Shortage Within Your Organization

Michael Buckbee

Michael Buckbee

As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business

The World’s Most Creative Data Centers: Infographic

Rob Sobers

Rob Sobers

Ever wonder where the world’s most established companies house their data centers? From facilities with roofs made up entirely of plants, to centers located in mines 22 stories below ground, here are the 10 most creative data centers in the world.

Varonis DatAlert and IBM QRadar

Michael Buckbee

Michael Buckbee

Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar. The Varonis App for QRadar adds context and security analytics to simplify investigations, streamline threat detection, and build...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.