Blog

Data Security

Adventures in Fileless Malware: Closing Thoughts

Michael Buckbee

Michael Buckbee

I think we can all agree that hackers have a lot of tricks and techniques to sneakily enter your IT infrastructure and remain undetected while they steal the digital goodies....

11 Popular Programming Languages to Open Doors

Rob Sobers

Rob Sobers

This extensive list of programming languages includes an overview of each language, its common uses, career options, fields, origin, features and resources.

12 Ways Varonis Helps You Manage Mergers and Acquisitions

Michael Buckbee

Michael Buckbee

A well-constructed Merger & Acquisition (M&A) playbook reduces the overall time, cost and risk of the upcoming merger and/or acquisition. Gartner advises that organizations who intend to grow through acquisitions...

Krack Attack: What You Need to Know

Michael Buckbee

Michael Buckbee

For the last decade, philosophers have been in agreement that there is another, deeper level within Maslow’s Hierarchy of Human Needs: WiFi Access. We’re now at the point where even...

Which Cybersecurity Career Is Right For Me?

Rob Sobers

Rob Sobers

Finding the right career path in the cybersecurity industry isn’t always easy. We interviewed cybersecurity experts to find out what inspired them!

The World in Data Breaches

Rob Sobers

Rob Sobers

The number of lost or stolen data records varies around the world. Using data from the Breach Level Index, we visualized where these records are concentrated based on the locations of the organizations that reported them. Take a look!

CISM vs. CISSP Certification: Which One is Best for You?

Michael Buckbee

Michael Buckbee

CISM and CISSP are two of the most highly regarded certifications for cybersecurity leaders and practitioners, but their requirements aren’t trivial. Both require a significant investment of time and money – so It’s important to determine which is right for you. Take a look at our comparison of the two to learn more.

Koadic: Implants and Pen Testing Wisdom, Part III

Michael Buckbee

Michael Buckbee

One of the benefits of working with Koadic is that you too can try your hand at making enhancements. The Python environment with its nicely organized directory structures lends itself to...

Are These 10 Cybersecurity Myths Putting Your Business at Risk?

Rob Sobers

Rob Sobers

From the myth of strong passwords to misconceptions surrounding which businesses hackers target and why, there are a number of cybersecurity misunderstandings that could be putting your business at risk of attack. Are you or your employees falling for them?

Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors

Michael Buckbee

Michael Buckbee

Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....

What is a DDoS Attack? Identifying Denial-of-Service Attacks

Michael Buckbee

Michael Buckbee

Distributed Denial-of-service (DDoS) attacks are disruptive and costly. Learn more about DDoS attacks and how you can better protect your network.

Varonis Gets Lightning Fast with Solr

Michael Buckbee

Michael Buckbee

Any security practitioner that has had to perform forensic analysis on a cybersecurity incident likely describes the process as “searching for a needle in a stack of needles.” Even Tony...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.