Blog

Data Security

A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable

Michael Buckbee

Michael Buckbee

Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...

The Likelihood of a Cyber Attack Compared

Rob Sobers

Rob Sobers

The chances of experiencing a cyber attack are higher than you'd think. Take a look as we compare the odds.

It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files

Rachel Hunt

Rachel Hunt

If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find? Every year, Varonis gives the world a behind-the-scenes...

Solving The Cybersecurity Skills Shortage Within Your Organization

Michael Buckbee

Michael Buckbee

As technology evolves and cyberattacks increase so does the gap in the cybersecurity workforce, read on to see tech shortage solutions for your business

The World’s Most Creative Data Centers: Infographic

Rob Sobers

Rob Sobers

Ever wonder where the world’s most established companies house their data centers? From facilities with roofs made up entirely of plants, to centers located in mines 22 stories below ground, here are the 10 most creative data centers in the world.

Varonis DatAlert and IBM QRadar

Michael Buckbee

Michael Buckbee

Varonis now integrates with the IBM QRadar Security Intelligence Platform, with the Varonis App for QRadar. The Varonis App for QRadar adds context and security analytics to simplify investigations, streamline threat detection, and build...

Best Practices for SharePoint Permissioning

Jonathan Pistilli

Jonathan Pistilli

SharePoint is Microsoft’s enterprise-class environment for sharing content: documents, presentations, spreadsheets, notes, images, and more. While SharePoint has many advantages over a raw file system in terms of content management,...

Automating Permissions Cleanup: An In-Depth ROI Analysis

Michael Buckbee

Michael Buckbee

Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...

How Major Companies Find Leaks

Rob Sobers

Rob Sobers

Learn how major companies like Google and Facebook detect leaks and see what techniques you can use to protect your company from attacks.

Brute Force: Anatomy of an Attack

Ofer Shezaf

Ofer Shezaf

The media coverage of NotPetya has hidden what might have been a more significant attack: a brute force attack on the UK Parliament.  While for many it was simply fertile...

Koadic: Pen Testing, Pivoting, & JavaScripting, Part II

Michael Buckbee

Michael Buckbee

Mshta and rundll32, the Windows binaries that Koadic leverages, have been long known to hackers. If you take a peek at Mitre’s ATT&CK database, you’ll see that rundll32 has been...

Active Directory Domain Services (AD DS): Overview and Functions

Michael Buckbee

Michael Buckbee

Active Directory Domain Services (AD DS) are the core functions that make AD work. Learn more about AD DS and how to defend AD against cyber attacks.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.