Blog

Data Security

What Would The World’s Data Look Like if it Were Physical?

Michael Buckbee

Michael Buckbee

Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.

Why A Honeypot Is Not A Comprehensive Security Solution

Michael Buckbee

Michael Buckbee

A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...

What is Metasploit? The Beginner's Guide

Michael Buckbee

Michael Buckbee

This Ruby-based open-source framework, Metasploit, allows testing via command line alterations or GUI. Learn more with our beginner's guide today.

COVID-19 Threat Update #2

Kilian Englert

Kilian Englert

The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices.  It only takes one compromised remote...

COVID-19 Threat Update #1

Kilian Englert

Kilian Englert

Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...

What is DLP?

What is Data Loss Prevention (DLP)?

Nolan Necoechea

Nolan Necoechea

Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.

What is Endpoint Security? A Complete Guide

Michael Buckbee

Michael Buckbee

Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.

Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget

Rob Sobers

Rob Sobers

Celebrate cybersecurity awareness year-round with these cybersecurity memo templates and attention-grabbing flyers that promote awareness and best practices

How Hackers Use OSINT to Find Business Data

Kody Kinzie

Kody Kinzie

OSINT can be a valuible resource for finding business data, if you know where to look. Here are the best sources of OSINT for business info in 2019.

What is a Security Operations Center (SOC)?

Michael Buckbee

Michael Buckbee

Learn how a security operations center (SOC) functions in an enterprise, SOC models, job roles, best practices and the value it brings to an organization

A Practical Software Approach to Insider Threats

Michael Buckbee

Michael Buckbee

Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But...

Adventures in Fileless Malware, Part IV: DDE and Word Fields

Michael Buckbee

Michael Buckbee

For this next post, I was all ready to dive into a more complicated fileless attack scenario involving multiple stages and persistence. Then I came across an incredibly simple code-free...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.