Blog

Data Security

Varonis Data Risk Assessment dashboard for data security

How Varonis’ Data Risk Assessment Works

Lexi Croisdale

Lexi Croisdale

Explore how Varonis' free Data Risk Assessment works and what makes it the most advanced DRA in the industry. Ensure your data is protected today.

Megan Garza and Scott Godes

Speed Data: Behind the Scenes of Cyber Insurance Recovery With Scott Godes

Megan Garza

Megan Garza

Scott Godes, Insurance Recovery Litigator for Barnes & Thornburg LLP, chats about the importance of cyber insurance, and how data privacy has evolved.

Megan Garza and Siwar El Assad

Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad

Megan Garza

Megan Garza

Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.

DSPM dashboard

DSPM Deep Dive: Debunking Data Security Myths

Kilian Englert

Kilian Englert

DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.

Megan Garza and Rick Howard

Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard

Megan Garza

Megan Garza

Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.

eyeball with skull, threat detected

The Benefits of Threat and Data Breach Reports

Scott Shafer

Scott Shafer

Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.

three ways Varonis fights insider threats

Three Ways Varonis Helps You Fight Insider Threats

Shane Walsh

Shane Walsh

Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.

AJ Forysiak

Speed Data: Tackling Federal Cybersecurity Challenges With AJ Forysiak

Megan Garza

Megan Garza

Building networks with military, civilian, and intelligence community leaders is just part of AJ’s day-to-day as the Business Development Executive for the Varonis Department of Defense team.

CISO first 90 days guide

A CISO's First 90 Days: The Ultimate Action Plan and Advice

Avia Navickas

Avia Navickas

Over the last 10 years, the role of the CISO has become pretty complex. By the end of this blog you'll have a solid 90-day plan to step into a new CISO role.

Megan Garza and Kieron Newsham

Speed Data: Bringing Resiliency and Passion to Cybersecurity with Kieron Newsham

Megan Garza

Megan Garza

Kieron Newsham, Chief Technologist of Cybersecurity for Softcat, shares how his military background helps him in his role and his passion for security.

Copilot prompt exposing sensitive data that Varonis stops

Copilot Security: Ensuring a Secure Microsoft Copilot Rollout

Rob Sobers

Rob Sobers

This article describes how Microsoft 365 Copilot's security model works and the risks that must be considered to ensure a safe rollout.

A black justice scale floats on a sapphire blue background. A computer monitor is shown over the scale.

SEC Cybersecurity Disclosure Requirements’ Impact on Your Business

Rob Sobers

Rob Sobers

New SEC regulations change how public companies disclose hacks, breaches, and cyber incidents. Here’s everything you need to know.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.