Blog

Data Security

Zero-Day Vulnerability Explained

Michael Buckbee

Michael Buckbee

Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.

Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation

Michael Buckbee

Michael Buckbee

Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...

Spotlighting Unstructured Data Access

Rob Sobers

Rob Sobers

At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T,...

What Working in Cybersecurity is Really Like: A Day in the Life

Rob Sobers

Rob Sobers

Learn what working in cybersecurity is like from Q&A with experts across various job roles — including which skills you need, resources and expert advice

What Certifications Should I Get for IT?

Rob Sobers

Rob Sobers

Elevate your IT knowledge and credentials by using our IT certification flowcharts to find the right certification for your experience level and interests.

Maximize your ROI: Maintaining a Least Privilege Model

Michael Buckbee

Michael Buckbee

TL;DR: Managing permissions can be expensive. For a 1,000 employee company, the overhead of permissions request tickets can cost up to $180K/year. Automating access control with DataPrivilege can save $105K/year...

Adventures in Fileless Malware: Closing Thoughts

Michael Buckbee

Michael Buckbee

I think we can all agree that hackers have a lot of tricks and techniques to sneakily enter your IT infrastructure and remain undetected while they steal the digital goodies....

11 Popular Programming Languages to Open Doors

Rob Sobers

Rob Sobers

This extensive list of programming languages includes an overview of each language, its common uses, career options, fields, origin, features and resources.

12 Ways Varonis Helps You Manage Mergers and Acquisitions

Michael Buckbee

Michael Buckbee

A well-constructed Merger & Acquisition (M&A) playbook reduces the overall time, cost and risk of the upcoming merger and/or acquisition. Gartner advises that organizations who intend to grow through acquisitions...

Krack Attack: What You Need to Know

Michael Buckbee

Michael Buckbee

For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access. We’re now at the point where even...

Which Cybersecurity Career Is Right For Me?

Rob Sobers

Rob Sobers

Finding the right career path in the cybersecurity industry isn’t always easy. We interviewed cybersecurity experts to find out what inspired them!

The World in Data Breaches

Rob Sobers

Rob Sobers

The number of lost or stolen data records varies around the world. Using data from the Breach Level Index, we visualized where these records are concentrated based on the locations of the organizations that reported them. Take a look!

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.