Data Security
What Would The World’s Data Look Like if it Were Physical?
Mar 29, 2020
Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.
Why A Honeypot Is Not A Comprehensive Security Solution
Mar 29, 2020
A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...
What is Metasploit? The Beginner's Guide
Mar 29, 2020
This Ruby-based open-source framework, Metasploit, allows testing via command line alterations or GUI. Learn more with our beginner's guide today.
COVID-19 Threat Update #2
Mar 26, 2020
The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices. It only takes one compromised remote...
COVID-19 Threat Update #1
Mar 19, 2020
Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...
What is Data Loss Prevention (DLP)?
Oct 24, 2019
Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.
What is Endpoint Security? A Complete Guide
Oct 17, 2019
Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.
Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget
Oct 17, 2019
Celebrate cybersecurity awareness year-round with these cybersecurity memo templates and attention-grabbing flyers that promote awareness and best practices
How Hackers Use OSINT to Find Business Data
Oct 15, 2019
OSINT can be a valuible resource for finding business data, if you know where to look. Here are the best sources of OSINT for business info in 2019.
What is a Security Operations Center (SOC)?
Oct 02, 2019
Learn how a security operations center (SOC) functions in an enterprise, SOC models, job roles, best practices and the value it brings to an organization
A Practical Software Approach to Insider Threats
Sep 30, 2019
Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But...
Adventures in Fileless Malware, Part IV: DDE and Word Fields
Jul 09, 2019
For this next post, I was all ready to dive into a more complicated fileless attack scenario involving multiple stages and persistence. Then I came across an incredibly simple code-free...
Try Varonis free.
Deploys in minutes.