Data Security
Browsing Anonymously: Is It Really Anonymous?
Mar 29, 2020
What can tools like private browsing and VPNs really deliver in terms of privacy? See for yourself as we take a deep dive into popular privacy tools
How to Turn Cybersecurity Jargon into a Language Everyone in Your Office Can Speak
Mar 29, 2020
Cybersecurity jargon can be confusing, but it's imperative that every member of your organization — not just the IT department — understands what they mean. In this article, we explain how to translate 10 cybersecurity buzzwords for everyone in your office.
7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers
Mar 29, 2020
While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi...
Security Risk Analysis Is Different From Risk Assessment
Mar 29, 2020
At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....
58% of organizations have more than 100,000 folders open to all employees
Mar 29, 2020
Like a wardrobe malfunction during a live broadcast, no one wants to be overexposed – especially when it comes to your data. The surprising truth: most companies go about their...
Analyzing Company Reputation After a Data Breach
Mar 29, 2020
Does a data breach affect how your customers see you? Take a look at what Americans think as we dive into the relationship between breaches and reputation.
What Would The World’s Data Look Like if it Were Physical?
Mar 29, 2020
Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.
Why A Honeypot Is Not A Comprehensive Security Solution
Mar 29, 2020
A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...
What is Metasploit? The Beginner's Guide
Mar 29, 2020
This Ruby-based open-source framework, Metasploit, allows testing via command line alterations or GUI. Learn more with our beginner's guide today.
COVID-19 Threat Update #2
Mar 26, 2020
The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices. It only takes one compromised remote...
COVID-19 Threat Update #1
Mar 19, 2020
Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...
What is Data Loss Prevention (DLP)?
Oct 24, 2019
Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.
Try Varonis free.
Deploys in minutes.