Data Security
Verizon 2018 DBIR: Phishing, Stolen Passwords, and Other Cheap Tricks
Apr 17, 2018
Like the rest of the IT security world last week, I had to stop everything I was doing to delve into the latest Verizon Data Breach Investigations Report. I spent...
Women in Tech: The Anatomy of a Female Cybersecurity Leader
Apr 10, 2018
Learn more about the powerful women in tech as we look at a breakdown of today's female cybersecurity leaders!
GDPR Data Protection Supervisory Authority Listing
Mar 01, 2018
The DPA (Data Protection Authority) is the agency within each European Union country that is responsible for GDPR (General Data Protection Regulation) assistance and enforcement. A Data Protection Authority handles...
Best of the Inside Out Security Show Podcast
Dec 15, 2017
We’ve interviewed many privacy experts, chief data officers, security pros and learned so much about the real world. Because we’ve covered so much, I’ve curated the most popular infosec quotes...
Why A Honeypot Is Not A Comprehensive Security Solution
Oct 30, 2017
A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...
[Transcript] Ofer Shezaf and Keeping Ahead of the Hackers
Oct 03, 2017
Inside Out Security: Today I’m with Ofer Shezaf, who is Varonis’s Cyber Security Director. What does that title mean? Essentially, Ofer’s here to make sure that our products help customers...
Complete Guide to Windows File System Auditing - Varonis
Jun 28, 2017
Windows file auditing is key in a cybersecurity plan. Learn about file system auditing and why you'll need an alternate method to get usable file audit data
🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know
Jun 27, 2017
On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed...
What is UPnP and why is it Dangerous?
Jun 26, 2017
Learn what UPnP (Universal Plug and Play) is and about its potential dangers. Contact us today for all of your cybersecurity needs.
I Click Therefore I Exist: Disturbing Research On Phishing
Jun 20, 2017
Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until...
GDPR: Troy Hunt Explains it All in Video Course
Jun 14, 2017
You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day...
[Infographic] From Bad Report Cards to Insider Data Theft
Jun 12, 2017
We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long...
Try Varonis free.
Deploys in minutes.