-
Data Security
Apr 10, 2023
Global Threat Trends and the Future of Incident Response
Last year alone, the Varonis Incident Response team investigated more than 250K alerts. No, that’s not a typo — our IR team reviewed a quarter of a million alerts. With ransomware on the rise and the amount of data growing at an exponential pace, having a proactive team on the frontline is more important than ever.
Megan Garza
3 min read
-
Data Security
Mar 23, 2023
Top Cybersecurity Trends for 2023
In recent years, the world of cybersecurity has seen its fair share of headline-grabbing happenings: the post-pandemic shift to remote work, a former social media exec whistleblowing, the AI-driven ChatGPT phenomenon, and much more.
Megan Garza
5 min read
-
Data Security
Mar 22, 2023
Varonis Named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023
Varonis is proud to be named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023. As the vendor with the highest score in the strategy category, we believe Varonis is well-positioned to help organizations achieve the data security outcomes they want, without burdening their security teams.
Avia Navickas
2 min read
-
Data Security
Mar 10, 2023
A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance
California is the first state to introduce data privacy protection regulations on par with the EU’s General Data Protection Regulation (GDPR). As one of the first pieces of digital consumer data privacy legislation in the country, the California Consumer Privacy Act (CCPA) provides strong individual rights and protections around data access and collection. Read on to learn more about what CCPA entails and how to achieve compliance in a step-by-step fashion.
David Harrington
10 min read
-
Data Security Privacy & Compliance
Mar 10, 2023
HIPAA Compliance: Your Complete 2025 Checklist
The Health Insurance Portability and Accountability Act (HIPAA) is one of the cornerstones for both regulatory compliance and healthcare cybersecurity. Hospitals, insurance companies and healthcare providers all need to follow a HIPAA compliance checklist to safeguard private and sensitive patient data.
Daniel Miller
12 min read
-
Data Security
Sep 09, 2022
What Is a Data Leak? Definition and Prevention Tips
A data leak can result in serious financial, reputational, and legal repercussions, whether caused by employee negligence, an insider threat, or a hack. When sensitive data is exposed, everything from social security numbers to health records can end up in the wrong hands.
Nolan Necoechea
4 min read
-
Data Security
Sep 09, 2022
What Is Zero Trust? Architecture and Security Guide
Developed by renowned analyst John Kindervag, Zero Trust is a strategic cybersecurity model that protects critical systems and data. Systems operating under a Zero Trust framework do not initially trust access or transactions from anyone — including internal users behind the firewall — and limit data access to minimize the blast radius of a cyber attack.
Michael Buckbee
8 min read
-
Data Security
Aug 26, 2022
What is Mimikatz? The Beginner's Guide
Benjamin Delpy originally created Mimikatz as a proof of concept to show Microsoft that its authentication protocols were vulnerable to an attack. Instead, he inadvertently created one of the most widely used and downloaded threat actor tools of the past 20 years.
Michael Buckbee
4 min read
-
Data Security
Aug 19, 2022
How to Use Wireshark: Comprehensive Tutorial + Tips
If you find yourself troubleshooting network issues, and you have to inspect individual packets, you need to use Wireshark. Wireshark is the de facto, go-to, you-need-to-know-how-to-use, application to capture and investigate network traffic.
Kody Kinzie
7 min read
-
Data Security
Jul 22, 2022
What Is SQL Injection? Identification & Prevention Tips
SQL injection is among the top 10 open web application security project (OWASP) vulnerabilities. Applications tend to be at risk of high-profile vulnerabilities like SQL injection attacks. The results of a SQL injection attack vary, ranging from retrieving confidential data to altering an application’s logic.
Alvin Mwambi
6 min read
-
Data Security
Jul 08, 2022
157 Cybersecurity Statistics and Trends [updated 2024]
Cybersecurity is a day-to-day operation for many businesses, but it’s not a small task to stay on top of what’s been going on over the past year or so.
Rob Sobers
13 min read
-
Data Security
Jul 08, 2022
Data Lifecycle Management (DLM): Everything You Need to Know
Thomas Redman, aka the Data Doc, hit the nail on the head when he said "Where there is data smoke, there is business fire." As data is now the most important asset of most organizations, data breaches, mishandling, or loss can and will cause significant disruption across many areas of operations. And to mitigate these risks, you’ll need to implement Data Lifecycle Management (DLM).
David Harrington
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital