Blog

Data Security

[Transcript] Ofer Shezaf and Keeping Ahead of the Hackers

Michael Buckbee

Michael Buckbee

Inside Out Security: Today I’m with Ofer Shezaf, who is Varonis’s Cyber Security Director. What does that title mean? Essentially, Ofer’s here to make sure that our products help customers...

Complete Guide to Windows File System Auditing - Varonis

Michael Buckbee

Michael Buckbee

Windows file auditing is key in a cybersecurity plan. Learn about file system auditing and why you'll need an alternate method to get usable file audit data

🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know

Rob Sobers

Rob Sobers

On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed...

What is UPnP and why is it Dangerous?

Michael Buckbee

Michael Buckbee

Learn what UPnP (Universal Plug and Play) is and about its potential dangers. Contact us today for all of your cybersecurity needs.

I Click Therefore I Exist: Disturbing Research On Phishing

Michael Buckbee

Michael Buckbee

Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until...

GDPR: Troy Hunt Explains it All in Video Course

Michael Buckbee

Michael Buckbee

You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day...

[Infographic] From Bad Report Cards to Insider Data Theft

Michael Buckbee

Michael Buckbee

We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long...

Reality Leah Winner and the Age of Insider Threats

Rob Sobers

Rob Sobers

Prosecutors allege that 25-year-old federal contractor Reality Leah Winner printed a top-secret NSA document detailing the ongoing investigation into Russian election hacking last November and mailed it to The Intercept....

Data Breach Definition by State

Michael Buckbee

Michael Buckbee

State governments are becoming more aware of PII and PHI data breaches, how about your state? See how PII is protected per state with our primer on US State Data Breach Law Definitions.

Disabling PowerShell and Other Malware Nuisances, Part II

Michael Buckbee

Michael Buckbee

Whitelisting apps is nobody’s idea of fun. You need to start with a blank slate, and then carefully add back apps you know to be essential and non-threatening. That’s the...

Disabling PowerShell and Other Malware Nuisances, Part I

Michael Buckbee

Michael Buckbee

Back in more innocent times, circa 2015, we began to hear about hackers going malware-free and “living off the land.” They used whatever garden-variety IT tools were lying around on...

Is a ransomware attack a data breach?

Michael Buckbee

Michael Buckbee

Understanding if ransomware is a data breach is vital to determining what response your IT and Legal department needs to take.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.