-
Data Security Security Bulletins Threat Research
Mar 19, 2020
COVID-19 Threat Update #1
Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...
Kilian Englert
1 min read
-
Data Security
Oct 24, 2019
What is Data Loss Prevention (DLP)?
Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.
Nolan Necoechea
4 min read
-
Data Security PowerShell Security Bulletins
Oct 17, 2019
What is Endpoint Security? A Complete Guide
Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.
Michael Buckbee
7 min read
-
Data Security
Oct 17, 2019
Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget
Celebrate cybersecurity awareness year-round with these cybersecurity memo templates and attention-grabbing flyers that promote awareness and best practices
Rob Sobers
7 min read
-
Data Security
Oct 15, 2019
How Hackers Use OSINT to Find Business Data
OSINT can be a valuible resource for finding business data, if you know where to look. Here are the best sources of OSINT for business info in 2019.
Kody Kinzie
8 min read
-
Data Security Security Bulletins
Oct 02, 2019
What is a Security Operations Center (SOC)?
Learn how a security operations center (SOC) functions in an enterprise, SOC models, job roles, best practices and the value it brings to an organization
Michael Buckbee
7 min read
-
Data Security
Sep 30, 2019
A Practical Software Approach to Insider Threats
Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But...
Michael Buckbee
5 min read
-
Data Security
Jul 09, 2019
Adventures in Fileless Malware, Part IV: DDE and Word Fields
For this next post, I was all ready to dive into a more complicated fileless attack scenario involving multiple stages and persistence. Then I came across an incredibly simple code-free...
Michael Buckbee
4 min read
-
Data Security
Jun 20, 2019
Working With Windows Local Administrator Accounts, Part III
One point to keep in mind in this series is that we’re trying to limit the powers that are inherent in Administrator accounts. In short: use the Force sparingly. In...
Michael Buckbee
2 min read
-
Data Security
Nov 05, 2018
California Consumer Privacy Act (CCPA) vs. GDPR
Check out our interactive Venn diagram below to better understand the similarities and differences between the GDPR and CCPA.
Michael Buckbee
5 min read
-
Data Security
Oct 10, 2018
What is ITAR Compliance? Definition and Regulations
Learn more about ITAR compliance, requirements, and penalties. Find the definition, detail of regulations, types of defense articles, and more from Varonis.
Michael Buckbee
4 min read
-
Data Security
Oct 05, 2018
Master Fileless Malware Penetration Testing!
Our five-part series brings you up to speed on stealthy techniques used by hackers. Learn how to sneakily run scripts with mshta, rundll32, and regsrvr32, scary Windows binaries that live...
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital