Blog

Data Security

Varonis Version 7.0

Michael Buckbee

Michael Buckbee

Version 7.0 of the Varonis Data Security Platform is here – featuring new cloud support and advanced threat detection and response capabilities: new event sources and enrichment; out-of-the-box threat intelligence applied to...

Hacker Motives: Red Flags and Prevention

Michael Buckbee

Michael Buckbee

Hacker are motivated by different things to compromise your data. See what patterns hackers have been following and how you can keep your company safe.

What is a Whaling Attack?

Michael Buckbee

Michael Buckbee

A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.

Kerberos Attack: How to Stop Golden Tickets?

Michael Buckbee

Michael Buckbee

The Golden Ticket Attack, discovered by security researcher Benjamin Delpy, gives an attacker total and complete access to your entire domain. It’s a Golden Ticket (just like in Willy Wonka)...

What is CDM and How Does Varonis Help?

Michael Buckbee

Michael Buckbee

The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...

What is an IT Security Audit? The Basics

Michael Buckbee

Michael Buckbee

Security audits are crucial to maintaining effective securilty policies and practices — learn best practices, audit types and what to look for in an audit

What is DCOM (Distributed Component Object Model)?

Michael Buckbee

Michael Buckbee

DCOM (Distributed Component Object Model) is a programming construct that allows a computer to run programs over the network on a different computer as if the program was running locally. Our guide details everything you need to know and more, check it out!

Protect Your Data With Super Easy File Security Tricks!

Michael Buckbee

Michael Buckbee

But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.

Social Media Security: How Safe is Your Information? 

Rob Sobers

Rob Sobers

What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!  

What is an Advanced Persistent Threat (APT)?

Michael Buckbee

Michael Buckbee

An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more

10 Secure File Sharing Options, Tips and Solutions

Michael Buckbee

Michael Buckbee

When moving digital data across networks, there is a number of different tools and solutions that will fit various business needs at the enterprise level.

5 Cybersecurity Concerns of Industry Insiders

Rachel Hunt

Rachel Hunt

We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current cybersecurity concerns and issues. Read on to discover what we found!

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.