Blog

Data Security

What is DCOM (Distributed Component Object Model)?

Michael Buckbee

Michael Buckbee

DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!

Protect Your Data With Super Easy File Security Tricks!

Michael Buckbee

Michael Buckbee

But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.

Social Media Security: How Safe is Your Information? 

Rob Sobers

Rob Sobers

What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!  

What is an Advanced Persistent Threat (APT)?

Michael Buckbee

Michael Buckbee

An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more

10 Secure File Sharing Options, Tips and Solutions

Michael Buckbee

Michael Buckbee

When moving digital data across networks, there is a number of different tools and solutions that will fit various business needs at the enterprise level.

5 Cybersecurity Concerns of Industry Insiders

Rachel Hunt

Rachel Hunt

We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current cybersecurity concerns and issues. Read on to discover what we found!

Zero-Day Vulnerability Explained

Michael Buckbee

Michael Buckbee

Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.

Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation

Michael Buckbee

Michael Buckbee

Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...

Spotlighting Unstructured Data Access

Rob Sobers

Rob Sobers

At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T,...

What Working in Cybersecurity is Really Like: A Day in the Life

Rob Sobers

Rob Sobers

Learn what working in cybersecurity is like from Q&A with experts across various job roles — including which skills you need, resources and expert advice

What Certifications Should I Get for IT?

Rob Sobers

Rob Sobers

Elevate your IT knowledge and credentials by using our IT certification flowcharts to find the right certification for your experience level and interests.

Maximize your ROI: Maintaining a Least Privilege Model

Michael Buckbee

Michael Buckbee

TL;DR: Managing permissions can be expensive. For a 1,000 employee company, the overhead of permissions request tickets can cost up to $180K/year. Automating access control with DataPrivilege can save $105K/year...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.