Blog

Data Security

The Anatomy of a Phishing Email

Rob Sobers

Rob Sobers

Have you been hooked by a phishing email? We’ve broken out the most common components of a phishing email. Check out our full guide to test your knowledge!

Verizon 2018 DBIR: Phishing, Stolen Passwords, and Other Cheap Tricks

Michael Buckbee

Michael Buckbee

Like the rest of the IT security world last week, I had to stop everything I was doing to delve into the latest Verizon Data Breach Investigations Report. I spent...

Women in Tech: The Anatomy of a Female Cybersecurity Leader

Michael Buckbee

Michael Buckbee

Learn more about the powerful women in tech as we look at a breakdown of today's female cybersecurity leaders! 

GDPR Data Protection Supervisory Authority Listing

Michael Buckbee

Michael Buckbee

The DPA (Data Protection Authority) is the agency within each European Union country that is responsible for GDPR (General Data Protection Regulation) assistance and enforcement. A Data Protection Authority handles...

Best of the Inside Out Security Show Podcast

Michael Buckbee

Michael Buckbee

We’ve interviewed many privacy experts, chief data officers, security pros and learned so much about the real world. Because we’ve covered so much, I’ve curated the most popular infosec quotes...

Why A Honeypot Is Not A Comprehensive Security Solution

Michael Buckbee

Michael Buckbee

A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...

[Transcript] Ofer Shezaf and Keeping Ahead of the Hackers

Michael Buckbee

Michael Buckbee

Inside Out Security: Today I’m with Ofer Shezaf, who is Varonis’s Cyber Security Director. What does that title mean? Essentially, Ofer’s here to make sure that our products help customers...

Complete Guide to Windows File System Auditing - Varonis

Michael Buckbee

Michael Buckbee

Windows file auditing is key in a cybersecurity plan. Learn about file system auditing and why you'll need an alternate method to get usable file audit data

🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know

Rob Sobers

Rob Sobers

On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed...

What is UPnP and why is it Dangerous?

Michael Buckbee

Michael Buckbee

Learn what UPnP (Universal Plug and Play) is and about its potential dangers. Contact us today for all of your cybersecurity needs.

I Click Therefore I Exist: Disturbing Research On Phishing

Michael Buckbee

Michael Buckbee

Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until...

GDPR: Troy Hunt Explains it All in Video Course

Michael Buckbee

Michael Buckbee

You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.