Blog

Data Security

What is Security Analytics? Guide for the Non-Analytical

Michael Buckbee

Michael Buckbee

Security analytics is the practice of analyzing raw security data to discover preemptive and actionable security measures to increase cybersecurity. It’s not necessarily a particular technique, but certainly involves aggregating...

The Difference between a Computer Virus and Computer Worm

Michael Buckbee

Michael Buckbee

Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a...

Do Executives and Cybersecurity Pros Agree on Today’s Biggest Cyber Threats?

Rachel Hunt

Rachel Hunt

Breaches cost companies billions, erode trust and can have a long-lasting negative impact on a company’s brand. With so much as stake, we wondered: are C-Suite executives aligned with their...

What is SAML and How Does it Work?

Michael Buckbee

Michael Buckbee

Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). In this article we will discuss what SAML is, what it is used for and how it works.

How Honeypots Unmask Hackers & Scammers Online

Kody Kinzie

Kody Kinzie

How defenders use honeypots to unmask hackers, scammers, and internet catfish with tracking links

Varonis Version 7.0

Michael Buckbee

Michael Buckbee

Version 7.0 of the Varonis Data Security Platform is here – featuring new cloud support and advanced threat detection and response capabilities: new event sources and enrichment; out-of-the-box threat intelligence applied to...

Hacker Motives: Red Flags and Prevention

Michael Buckbee

Michael Buckbee

Hacker are motivated by different things to compromise your data. See what patterns hackers have been following and how you can keep your company safe.

What is a Whaling Attack?

Michael Buckbee

Michael Buckbee

A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.

Kerberos Attack: How to Stop Golden Tickets?

Michael Buckbee

Michael Buckbee

The Golden Ticket Attack, discovered by security researcher Benjamin Delpy, gives an attacker total and complete access to your entire domain. It’s a Golden Ticket (just like in Willy Wonka)...

What is CDM and How Does Varonis Help?

Michael Buckbee

Michael Buckbee

The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...

What is an IT Security Audit? The Basics

Michael Buckbee

Michael Buckbee

Security audits are crucial to maintaining effective securilty policies and practices — learn best practices, audit types and what to look for in an audit

What is DCOM (Distributed Component Object Model)?

Michael Buckbee

Michael Buckbee

DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.