Data Security
Zero-Day Vulnerability Explained
Mar 29, 2020
Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.
Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation
Mar 29, 2020
Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...
Spotlighting Unstructured Data Access
Mar 29, 2020
At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T,...
What Working in Cybersecurity is Really Like: A Day in the Life
Mar 29, 2020
Learn what working in cybersecurity is like from Q&A with experts across various job roles — including which skills you need, resources and expert advice
What Certifications Should I Get for IT?
Mar 29, 2020
Elevate your IT knowledge and credentials by using our IT certification flowcharts to find the right certification for your experience level and interests.
Maximize your ROI: Maintaining a Least Privilege Model
Mar 29, 2020
TL;DR: Managing permissions can be expensive. For a 1,000 employee company, the overhead of permissions request tickets can cost up to $180K/year. Automating access control with DataPrivilege can save $105K/year...
Adventures in Fileless Malware: Closing Thoughts
Mar 29, 2020
I think we can all agree that hackers have a lot of tricks and techniques to sneakily enter your IT infrastructure and remain undetected while they steal the digital goodies....
11 Popular Programming Languages to Open Doors
Mar 29, 2020
This extensive list of programming languages includes an overview of each language, its common uses, career options, fields, origin, features and resources.
12 Ways Varonis Helps You Manage Mergers and Acquisitions
Mar 29, 2020
A well-constructed Merger & Acquisition (M&A) playbook reduces the overall time, cost and risk of the upcoming merger and/or acquisition. Gartner advises that organizations who intend to grow through acquisitions...
Krack Attack: What You Need to Know
Mar 29, 2020
For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access. We’re now at the point where even...
Which Cybersecurity Career Is Right For Me?
Mar 29, 2020
Finding the right career path in the cybersecurity industry isn’t always easy. We interviewed cybersecurity experts to find out what inspired them!
The World in Data Breaches
Mar 29, 2020
The number of lost or stolen data records varies around the world. Using data from the Breach Level Index, we visualized where these records are concentrated based on the locations of the organizations that reported them. Take a look!
Try Varonis free.
Deploys in minutes.