Data Security
Varonis Version 7.0
Mar 29, 2020
Version 7.0 of the Varonis Data Security Platform is here – featuring new cloud support and advanced threat detection and response capabilities: new event sources and enrichment; out-of-the-box threat intelligence applied to...
Hacker Motives: Red Flags and Prevention
Mar 29, 2020
Hacker are motivated by different things to compromise your data. See what patterns hackers have been following and how you can keep your company safe.
What is a Whaling Attack?
Mar 29, 2020
A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.
Kerberos Attack: How to Stop Golden Tickets?
Mar 29, 2020
The Golden Ticket Attack, discovered by security researcher Benjamin Delpy, gives an attacker total and complete access to your entire domain. It’s a Golden Ticket (just like in Willy Wonka)...
What is CDM and How Does Varonis Help?
Mar 29, 2020
The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...
What is an IT Security Audit? The Basics
Mar 29, 2020
Security audits are crucial to maintaining effective securilty policies and practices — learn best practices, audit types and what to look for in an audit
What is DCOM (Distributed Component Object Model)?
Mar 29, 2020
DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!
Protect Your Data With Super Easy File Security Tricks!
Mar 29, 2020
But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.
Social Media Security: How Safe is Your Information?
Mar 29, 2020
What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!
What is an Advanced Persistent Threat (APT)?
Mar 29, 2020
An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more
10 Secure File Sharing Options, Tips and Solutions
Mar 29, 2020
When moving digital data across networks, there is a number of different tools and solutions that will fit various business needs at the enterprise level.
5 Cybersecurity Concerns of Industry Insiders
Mar 29, 2020
We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current cybersecurity concerns and issues. Read on to discover what we found!
Try Varonis free.
Deploys in minutes.