Data Security
What is DCOM (Distributed Component Object Model)?
Mar 29, 2020
DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!
Protect Your Data With Super Easy File Security Tricks!
Mar 29, 2020
But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.
Social Media Security: How Safe is Your Information?
Mar 29, 2020
What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!
What is an Advanced Persistent Threat (APT)?
Mar 29, 2020
An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more
10 Secure File Sharing Options, Tips and Solutions
Mar 29, 2020
When moving digital data across networks, there is a number of different tools and solutions that will fit various business needs at the enterprise level.
5 Cybersecurity Concerns of Industry Insiders
Mar 29, 2020
We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current cybersecurity concerns and issues. Read on to discover what we found!
Zero-Day Vulnerability Explained
Mar 29, 2020
Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.
Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation
Mar 29, 2020
Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...
Spotlighting Unstructured Data Access
Mar 29, 2020
At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T,...
What Working in Cybersecurity is Really Like: A Day in the Life
Mar 29, 2020
Learn what working in cybersecurity is like from Q&A with experts across various job roles — including which skills you need, resources and expert advice
What Certifications Should I Get for IT?
Mar 29, 2020
Elevate your IT knowledge and credentials by using our IT certification flowcharts to find the right certification for your experience level and interests.
Maximize your ROI: Maintaining a Least Privilege Model
Mar 29, 2020
TL;DR: Managing permissions can be expensive. For a 1,000 employee company, the overhead of permissions request tickets can cost up to $180K/year. Automating access control with DataPrivilege can save $105K/year...
Try Varonis free.
Deploys in minutes.