Blog

Data Security

three ways Varonis fights insider threats

Three Ways Varonis Helps You Fight Insider Threats

Shane Walsh

Shane Walsh

Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.

AJ Forysiak

Speed Data: Tackling Federal Cybersecurity Challenges With AJ Forysiak

Megan Garza

Megan Garza

Building networks with military, civilian, and intelligence community leaders is just part of AJ’s day-to-day as the Business Development Executive for the Varonis Department of Defense team.

CISO first 90 days guide

A CISO's First 90 Days: The Ultimate Action Plan and Advice

Avia Navickas

Avia Navickas

Over the last 10 years, the role of the CISO has become pretty complex. By the end of this blog you'll have a solid 90-day plan to step into a new CISO role.

Megan Garza and Kieron Newsham

Speed Data: Bringing Resiliency and Passion to Cybersecurity with Kieron Newsham

Megan Garza

Megan Garza

Kieron Newsham, Chief Technologist of Cybersecurity for Softcat, shares how his military background helps him in his role and his passion for security.

Copilot prompt exposing sensitive data that Varonis stops

Copilot Security: Ensuring a Secure Microsoft Copilot Rollout

Rob Sobers

Rob Sobers

This article describes how Microsoft 365 Copilot's security model works and the risks that must be considered to ensure a safe rollout.

A black justice scale floats on a sapphire blue background. A computer monitor is shown over the scale.

SEC Cybersecurity Disclosure Requirements’ Impact on Your Business

Rob Sobers

Rob Sobers

New SEC regulations change how public companies disclose hacks, breaches, and cyber incidents. Here’s everything you need to know.

Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe

Yaki Faitelson

Yaki Faitelson

This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.

Speed Data: The Impact of AI on Attack Vectors With Justin Michael

Megan Garza

Megan Garza

Corbin Capital Partners CTO Justin Michael discusses the hot topic of ChatGPT. Justin leads guarding sensitive data for the leading asset management firm.

Strengthening Resilience: Data Security vs Data Resilience Tools

Nathan Coppinger

Nathan Coppinger

Learn the difference between backup tools and true DSPs and what to look for when you’re choosing a DSP.

Megan Garza and Jordan McClintock

Speed Data: The Importance of Data Privacy With Jordan McClintick

Megan Garza

Megan Garza

Jordan McClintick, Director of Data Governance and Privacy for Optiv, Inc. talks about how his law degree helps him in his current role in data privacy.

Black snake graphic exploits computer files

How the MOVEit Vulnerability Impacts Federal Government Agencies

Megan Garza

Megan Garza

Our latest State of Cybercrime episode examines the MOVEit vulnerability and its impact on victims, including federal government agencies.

Salesforce logo with users floating to the top, showcasing too many shared permissions and profile accesses

10 Tips to Pay Back Your Salesforce Technical Debt

Lexi Croisdale

Lexi Croisdale

Learn best practices for managing and analyzing permissions in Salesforce and how the need for quick solutions can put your organizations data at risk.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.