Blog

Data Security

Reality Leah Winner and the Age of Insider Threats

Rob Sobers

Rob Sobers

Prosecutors allege that 25-year-old federal contractor Reality Leah Winner printed a top-secret NSA document detailing the ongoing investigation into Russian election hacking last November and mailed it to The Intercept....

Data Breach Definition by State

Michael Buckbee

Michael Buckbee

State governments are becoming more aware of PII and PHI data breaches, how about your state? See how PII is protected per state with our primer on US State Data Breach Law Definitions.

Disabling PowerShell and Other Malware Nuisances, Part II

Michael Buckbee

Michael Buckbee

Whitelisting apps is nobody’s idea of fun. You need to start with a blank slate, and then carefully add back apps you know to be essential and non-threatening. That’s the...

Disabling PowerShell and Other Malware Nuisances, Part I

Michael Buckbee

Michael Buckbee

Back in more innocent times, circa 2015, we began to hear about hackers going malware-free and “living off the land.” They used whatever garden-variety IT tools were lying around on...

Is a ransomware attack a data breach?

Michael Buckbee

Michael Buckbee

Understanding if ransomware is a data breach is vital to determining what response your IT and Legal department needs to take.

EternalRocks leaves backdoor trojan for remote access to infected machines

Kieran Laffan

Kieran Laffan

What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1...

Adylkuzz: How WannaCry Ransomware Attack Alerted The World To Even Worse Threats

Rachel Hunt

Rachel Hunt

Your garden variety ransomware, like Cerber, is the canary in the coal mine that rudely, but thankfully announces bigger security issues: insider threats and cyberattacks that take advantage of too...

Why did last Friday's ransomware infection spread globally so fast?

Kieran Laffan

Kieran Laffan

Ransomware is a type of malware that encrypts your data and asks for you to pay a ransom to restore access to your files. Cyber criminals usually request that the...

🚨 Massive Ransomware Outbreak: What You Need To Know

Michael Buckbee

Michael Buckbee

Remember those NSA exploits that got leaked a few months back? A new variant of ransomware using those exploits is spreading quickly across the world – affecting everyone from the...

Planet Ransomware

Michael Buckbee

Michael Buckbee

If you were expecting a quiet Friday in terms of cyberattacks, this ain’t it. There are reports of a massive ransomware attack affecting computers on a global scale: in the...

What is a Data Security Portfolio?

Rob Sobers

Rob Sobers

A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools to reduce risk and prevent threats.

Varonis Data Security Platform Listed in Gartner 2017 Market Guide for Data-Centric Audit and Protection

Rachel Hunt

Rachel Hunt

In 2005, our founders had a vision to build a solution focused on protecting the data organizations have the most of and yet know the least about – files and...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.