<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.varonis.com/blog/azure-blob-storage</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/plataforma-de-seguranca-de-dados-da-varonis-e-citada-no-market-guide-do-gartner</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/placez-la-migration-de-donnees-sur-votre-liste-de-projets-informatiques-de-cet-automne</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-08-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/is-your-org-ready-for-microsoft-copilot</loc><lastmod>2024-01-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-perigo-esta-la-fora-nem-sempre</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/blog/data-governance</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-10-mandamentos-para-voce-nao-perder-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-a-botnet</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/faca-a-troca-de-senha-com-frequencia-e-garanta-a-seguranca-dos-dados-na-internet</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/what-is-dspm</loc><lastmod>2025-03-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-diferenca-entre-seguranca-de-dados-e-privacidade</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/azure-monitor</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/datendiebstahl-durch-angestellte</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/analisando-a-reputacao-da-empresa-apos-uma-violacao-de-dados/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/platform/dspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/ai-data-security</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://www.varonis.com/blog/meet-datadvantage-cloud</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-use-ghidra</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-meilleurs-tutoriels-azure-active-directory</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/chatgpt-enterprise</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/deepfakes-and-voice-clones</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-casse-tete-du-vol-de-propriete-intellectuelle-troisieme-partie-surveillez-votre-pdg</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/consulting4it-ist-unser-partner-of-the-year-2022</loc><lastmod>2023-06-21</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-jan-2024</loc><lastmod>2024-01-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-deal-with-sensitive-data-in-salesforce-a-guide-to-data-classification</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/gdpr-american-style-preview-of-proposed-federal-us-privacy-law-part-i</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/descubra-quais-sao-os-primeiros-passos-a-tomar-apos-uma-violacao-de-dados</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/active-directory-sperrung-wie-sie-anwendungen-mit-abgelaufenen-anmeldeinformationen-finden</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/john-the-ripper</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-neue-sicherheitskonzept-in-windows-10-teil-3-fido-und-mehr</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/data-classification-deep-dive</loc><lastmod>2026-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/ai-vs-ml-in-cybersecurity</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/data-lifecycle-management-dlm-tudo-o-que-voce-precisa-saber</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/erwischt-geheime-piis-in-ihren-unstrukturierten-daten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/jira-permissions</loc><lastmod>2022-07-21</lastmod></url><url><loc>https://www.varonis.com/blog/insider-danger-stealthy-password-hacking-with-smbexec</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/erkennung-von-malware-payloads-in-den-metadaten-von-office-dokumenten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/amazon-redshift</loc><lastmod>2024-07-05</lastmod></url><url><loc>https://www.varonis.com/webinars-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/finding-data-owners-with-varonis</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ameaca-interna-conheca-os-diferentes-tipos-e-proteja-se/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/verlassen-sie-sich-beim-schutz-vor-advanced-persistent-threats-nicht-auf-hohere-schutzwande</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-tips</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/john-the-ripper</loc><lastmod>2023-03-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-in-the-cloud</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/pci-dss-anforderungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/von-it-sicherheitsexperten-lernen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ccsp-vs-cissp</loc><lastmod>2022-05-25</lastmod></url><url><loc>https://www.varonis.com/blog/hipaa-nprm</loc><lastmod>2025-01-29</lastmod></url><url><loc>https://www.varonis.com/blog/azure-automation</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-saml-und-wie-funktioniert-sie</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-automatisierung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/what-is-mddr</loc><lastmod>2024-06-06</lastmod></url><url><loc>https://www.varonis.com/it/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-21</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/microsoft-365</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/mongodb</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-azure-sentinel</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-bicep</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/solutions/policy-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-identity-protection</loc><lastmod>2025-06-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/windows-powershell-vs-cmd-quelle-est-la-difference</loc><lastmod>2023-02-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/danalyse-des-malwares</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://www.varonis.com/fr/blog/google-cloud</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/des-fuites-sur-les-serveurs-de-la-nouvelle-zelande-demontrent-la-necessite-de-la-gouvernance-des-informations</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/it/blog/is-your-org-ready-for-microsoft-copilot</loc><lastmod>2024-01-03</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/aws</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/kubernetes-trends</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-soc</loc><lastmod>2023-02-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/vulnerabilite-exchange</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-vii-exfiltration-and-conclusions</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/datendiebstahl-durch-mitarbeiter</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/salesforce-saiba-como-a-varonis-economiza-horas-do-dia-dos-administradores</loc><lastmod>2023-05-04</lastmod></url><url><loc>https://www.varonis.com/es/platform/email-data-protection</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/es/blog/salesforce-shield</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-agentforce-security</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/platform/ai-security</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/data-security</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/blog/apex-code-vulnerabilities</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/apt-advanced-persistent-threat</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/data-security</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-lanca-ferramenta-de-gerenciamento-de-riscos-de-aplicativos-de-terceiros</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/detect-dropbox-network</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-aumentar-a-seguranca-de-sua-maquina-em-tempos-de-trabalho-remoto</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/presentation-azure-devops</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/devoiler-votre-mot-de-passe</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/neo4jection-secrets-data-and-cloud-exploits</loc><lastmod>2023-02-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-4-die-seitwartsbewegung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/kubernetes-trends</loc><lastmod>2025-04-08</lastmod></url><url><loc>https://www.varonis.com/blog/sspm</loc><lastmod>2024-06-19</lastmod></url><url><loc>https://www.varonis.com/es/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/votre-boite-aux-lettres-est-presque-pleine</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/blog/dealing-with-windows-local-administrator-accounts-part-ii</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/risiken-beim-umbenennen-von-active-directory-domains</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/gedanken-uber-die-nis-richtlinie-der-eu-nach-davos</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-da-informacao-no-topo-da-agenda-do-cfo</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/google-cloud</loc><lastmod>2024-11-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/cybersecurity-sprache-verstandlich-gemacht</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/svg-email-attacks</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-saml-et-comment-ca-marche</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tecnicas-de-engenharia-social-preocupam-a-ciberseguranca</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/wormgpt</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/kerberos-authentication-explained</loc><lastmod>2022-04-21</lastmod></url><url><loc>https://www.varonis.com/blog/share-permissions-by-david-gibson</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/frequently-asked-questions-faq-gdpr-and-hr-employee-data</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/12-facons-gerer-fusion-acquisition-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/prevent-pii-exposure</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/arbeiten-mit-lokalen-administratorkonten-unter-windows-teil-iii</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/netwalker-ransomware</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/pci-penetrationstests-und-schwachstellenprufungen-da-ist-noch-luft-nach-oben</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/differences-entre-autorisations-ntfs-et-autorisations-de-partage-tout-ce-quil-vous-faut-savoir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/koadic-implants-and-pen-testing-wisdom-part-iii</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/an-active-directory-domain-controller-could-not-be-contacted</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/advanced-phishing-tactics</loc><lastmod>2024-12-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/data-lifecycle-automation</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-garante-a-seguranca-de-dados-na-migracao-do-office-365-enterprise-e3-para-o-office-365-enterprise-e5-da-microsoft</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/dspm-buyers-guide</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/coverage/servicenow</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/logiciel-de-securite-des-donnees-mieux-vaut-une-plate-forme-quun-outil</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/7-recommandations-pour-la-protection-des-donnees-selon-andras-cser-de-linstitut-forrester</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cinq-choses-a-savoir-sur-la-nouvelle-legislation-europeenne-relative-a-la-protection-des-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/cybertech-tokyo-2025</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-custo-de-uma-invasao-ao-big-data/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/3-statistiques-qui-montrent-que-les-malwares-sont-encore-la-pour-un-moment</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-human-generated-data</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/ja/blog/create-custom-gpt</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-jenga-turm-der-datensicherheit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/malware-coding-fur-it-ler-teil-1-fud-fully-undetected-malware-selbst-programmieren</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/dns-tunneling</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/es/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-5-principales-techniques-de-balayage-des-ports</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/onenote-phishing</loc><lastmod>2025-07-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/zehn-der-kreativsten-datenzentren-der-welt</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/xanthorox-ai</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://www.varonis.com/es/blog/cloud-security-programs</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/ja/blog/varonis-interceptor</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/shadow-database-discovery</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/user-entity-behavior-analytics-ueba</loc><lastmod>2024-11-14</lastmod></url><url><loc>https://www.varonis.com/blog/azcopy-data-exfiltration</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/courtiers-en-donnees-trop-dinformations</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2025-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/the-malware-hiding-in-your-windows-system32-folder-more-alternate-data-streams-and-rundll32</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/company/contact</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.varonis.com/blog/copilot-security</loc><lastmod>2024-12-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-aprendemos-com-os-ataques-ao-partido-democrata</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/chatgpt-enterprise</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.varonis.com/ja/blog/dspm-use-cases</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/rund-um-den-index-vertiefende-infos-teil-ii</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-adds-file-analysis-to-cloud-data-classification-capabilities</loc><lastmod>2022-12-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/transforme-seus-funcionarios-em-ativos-de-seguranca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/home-office-aumenta-ocorrencias-de-ataques-ciberneticos/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-use-volatility</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/livre-blanc-dlp</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/sessionshark</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-breach-statistics</loc><lastmod>2022-08-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-aufgaben-die-it-abteilungen-durchfuhren-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/platform/athena-ai</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-mentionne-par-forrester-pour-ses-fonctions-de-classification-des-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/case-studies</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-eu-datenschutz-grundverordnung-im-fokus-pseudonymisierung-als-alternative-zu-verschlusselung</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-spear-phishing</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-uns-magic-kingdom-in-sachen-authentifizierung-lehrt-kerberos-aus-der-nahe-betrachtet-teil-i</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-do-data-classification-at-scale</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/blog/cookie-bite</loc><lastmod>2025-05-19</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-pat-benoit</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-adds-secrets-discovery</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-nutzen-uber-die-datenklassifizierung-hinaus</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-sur-le-ransomware-netwalker-tout-ce-quil-vous-faut-savoir</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-dns</loc><lastmod>2022-08-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/ipv6-sicherheit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/coverage/mongodb</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-splunk-epic-threat-detection-and-investigations</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-varonis-data-risk-assessment-works</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://www.varonis.com/ja/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/advanced-phishing-tactics</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/blog/aws-account-setup-best-practices</loc><lastmod>2025-01-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/nist-cybersecurity-framework</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/blog/eu-ai-act</loc><lastmod>2025-12-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salt-typhoon</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-for-salesforce-admins</loc><lastmod>2023-04-18</lastmod></url><url><loc>https://www.varonis.com/de/platform/email-data-protection</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/the-benefits-of-threat-and-data-breach-reports</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/infiltrieren-eines-azure-365-mandanten-mit-bosartigen-azure-apps</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/chimera-ein-neues-ransomware-modell</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-data-security-portfolio</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/pos-malware-in-der-hotelbranche</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/right-to-be-forgotten</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/compare-salesforce-user-permissions-with-ease</loc><lastmod>2022-10-13</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-teams</loc><lastmod>2022-08-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/sichtbarkeit-ist-die-grundvoraussetzung-fur-sicherheit</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-mimikatz-eine-einfuhrung</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-eu-datenschutz-grundverordnung-ist-beschlossen-was-sie-jetzt-wissen-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/esprits-criminels-penser-comme-un-hacker-permet-une-bonne-gouvernance-des-donnees</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/deepseek</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/solutions/data-lifecycle-automation</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/incursion-dans-le-piratage-sans-malware-partie-vi</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/deloitte-studie-zu-insider-bedrohungen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ai-data-security</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/es/blog/scattered-spider</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-18-01</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/m365-bec-attack</loc><lastmod>2025-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/presentation-de-la-plate-forme-de-securite-des-donnees-varonis-6-4-100</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/dlp-iam-siem-was-sie-konnen-und-was-nicht</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-bennett-family-of-companies-uses-varonis-to-secure-gen-ai</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-to-protect-your-cloud-environment-from-todays-top-5-threats</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/chatgpt-dlp-what-enterprises-need-to-know</loc><lastmod>2025-08-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/phishing-sur-google-drive</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/nist-cybersecurity-framework</loc><lastmod>2022-06-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/geteilte-ordner-sind-wie-kokosnusse-sie-migrieren-nicht-von-alleine</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/mamie-peut-utiliser-dropbox-pourquoi-pas-moi</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ameacas-internas-3-maneiras-pelas-quais-a-varonis-ajuda-voce</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-risques-du-renommage-de-domaine-avec-active-directory</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/usuario-e-o-maior-perigo-para-a-ciberseguranca</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/es/blog/google-cloud</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/blog/cryptowall</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/blog/levels-up-your-incident-response</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/we-know-about-your-companys-data-osint-lessons-for-c-levels</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/databricks</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/amazon-redshift</loc><lastmod>2024-07-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-sind-azure-devops</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-voce-precisa-de-mais-do-que-senhas/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/malware-abwehr-schutzen-sie-ihre-daten-mit-varonis-sicherheitsanalysen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/power-automate-data-exfiltration</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/es/blog/databricks</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/introducing-ai-shield-always-on-ai-risk-defense</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/google-cloud</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-monitor</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/link-protect-ist-unser-growth-partner-of-the-year-0</loc><lastmod>2023-07-12</lastmod></url><url><loc>https://www.varonis.com/it/solutions/data-lifecycle-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-the-city-of-gainesville-uses-varonis-to-automate-security-outcomes</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-funciona-a-avaliacao-de-risco-de-dados-varonis</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/data-lifecycle-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/dark-data-als-versteckte-vermogenswerte-in-unternehmen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ai-at-work</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/nmap-commands</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-reconhecer-os-diferentes-tipos-de-ameacas-internas-no-seu-negocio</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/eu-ai-act</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.varonis.com/blog/data-scanning</loc><lastmod>2025-04-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/compliance-brief-varonis-losungen-und-das-bundesamt-fur-sicherheit-in-der-informationstechnik-bsi</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/solutions/data-risk-assessment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/arp-poisoning</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-7-melhores-praticas-de-seguranca-da-informacao-para-o-office-365</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/solutions/ransomware-prevention</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-utiliser-autoruns</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/exploiting-vpc-endpoints-for-s3buckets</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/einfuhrung-unseres-neuen-dataprivilege-api-und-eine-vorschau-auf-kommende-gdpr-erkennungsmuster</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-part-vi-passing-the-hash</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/dlp-zero-trust</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ne-comptez-pas-sur-des-murs-de-donnees-plus-eleves-pour-tenir-les-menaces-avancees-persistantes-a-distance-2</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/verwendung-von-wireshark</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-phishing-nutzergenerierte-daten-und-das-datenrisiko-verbindet</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/when-ransomware-wreaks-havoc-on-hospitals</loc><lastmod>2025-06-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-seguranca-pode-tirar-proveito-da-ciencia-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/cloud-security-programs</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/contileaks</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/nys-shield-law-updates-to-pii-data-security-and-breach-notification</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/spoofing-url</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/blog/john-the-ripper</loc><lastmod>2022-12-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-auf-der-hannover-messe</loc><lastmod>2023-03-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/lempoisonnement-du-cache-dns</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/vmware-esxi-in-the-line-of-ransomware-fire</loc><lastmod>2023-03-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-ciberneticos-de-estado-nacao-o-que-sua-empresa-precisa-saber</loc><lastmod>2022-04-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/https-blog-varonis-fr-incursion-dans-le-piratage-sans-malware-partie-v</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ce-que-les-services-informatiques-peuvent-apprendre-du-fbi</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-05-15</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/ein-leitfaden-zum-datenlebenszyklus-erkennen-der-stellen-an-denen-ihre-daten-gefahrdet-sind</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/servicenow</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/netzwerksegmentierung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/state-of-data-security-report</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-year-in-review-2021</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-misconfiguration-causes-sensitive-data-leaks</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/es/blog/scaling-accurate-classification</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-fuite-de-donnees-equifax-et-la-protection-de-vos-donnees-en-ligne</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rapport-sur-les-tendances-des-malwares-mars-2021</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/new-mirai-attacks-still-passwords</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/introducing-ai-shield-always-on-ai-risk-defense</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/it/solutions/data-risk-assessment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/kuppingercole-bescheinigt-varonis</loc><lastmod>2022-03-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/meilleures-pratiques-de-nommage-de-domaines-active-directory</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-wege-um-active-directory-mit-varonis-zu-schutzen</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-em-camadas-saiba-como-implementar-no-seu-negocio</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-utiliser-aws-s3</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/coverage/salesforce</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/nist-cybersecurity-framework</loc><lastmod>2024-10-31</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-protect-gdpr-data-with-varonis</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-as-a-service</loc><lastmod>2023-05-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/analise-pratica-de-custo-de-ameacas-ciberneticas-um-modelo-de-risco-para-ataques-de-negacao-de-servico/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-helps-itar-compliance-2</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/someone-deleted-my-file-how-can-i-find-out-who</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/customer-stories/24-7-mddr-ffva-mutual</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://www.varonis.com/blog/goissue</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/acquisition-de-la-societe-polyrize</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/forcedleak</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-seriam-os-dados-do-mundo-se-fossem-fisicos</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/blog/ciso-tips-for-cybersecurity-leaders</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/und-immer-wieder-ransomware</loc><lastmod>2022-06-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/automate-data-security-with-varonis-data-centric-insights-and-cortex-xsoar</loc><lastmod>2022-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/8-tipps-um-die-datenschutz-apokalypse-zu-uberleben</loc><lastmod>2023-12-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-desafios-da-ado%C3%A7%C3%A3o-do-5g</loc><lastmod>2022-03-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-status-quo-in-sachen-datenschutzverletzungen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/dns-over-https-as-a-covert-command-and-control-channel</loc><lastmod>2022-09-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/notre-boule-de-cristal-peut-elle-le-voir-les-predictions-de-cybersecurite-de-varonis-pour-2017</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/shinyhunters-salesforce-aurainspector-attack</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-a-negligencia-ainda-causa-tantos-incidentes-de-seguranca</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/four-must-know-cyber-tips-for-your-business</loc><lastmod>2022-12-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/drei-vermeidbare-fehler-beim-management-von-dateiberechtigungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-informatique-sur-la-regle-de-notification-des-violations-du-gdpr-de-lue</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/building-trust-through-cybersecurity</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dans-lunivers-des-menaces-internes-4e-partie-conclusions</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/uma-abordagem-pratica-de-software-para-ameacas-internas</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/identify-and-investigate-business-email-compromise-scams-varonis</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/concierge</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/powershell-active-directory-module</loc><lastmod>2022-04-06</lastmod></url><url><loc>https://www.varonis.com/blog/sisense-data-breach</loc><lastmod>2024-04-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/github-secrets-discovery</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/blog/data-breaches-in-healthcare</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-de-ransomware-est%C3%A3o-aumentando-com-trabalho-hibrido</loc><lastmod>2022-09-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/verantwortungsvolle-datenvernichtung-mithilfe-automatisierter-prozesse</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/diebstahl-geistigen-eigentums-teil-3-behalten-sie-ihren-ceo-im-auge</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/group-policy-editor</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-chaine-cybercriminelle-en-8-etapes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/closer-look-pass-hash-part-ii-prevention</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/is-browsing-facebook-while-in-the-hospital-a-hipaa-violation</loc><lastmod>2023-03-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/it-leitfaden-zur-meldepflicht-laut-eu-dsgvo</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/design-thinking-for-your-data-strategy</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/it/platform/data-access-governance</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/cryptolocker-alles-was-sie-wissen-mussen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/detecting-agentic-ai-threats</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/blog/privacy-impact-assessment</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/8-conseils-pour-survivre-a-lapocalypse-de-la-securite-des-donnees</loc><lastmod>2023-12-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/certificacao-do-modelo-de-maturacao-da-seguranca-cibernetica-2.0-cmmc-2.0</loc><lastmod>2023-12-27</lastmod></url><url><loc>https://www.varonis.com/blog/ai-post-compromise-recon</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/cookie-bite</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-pci-dds-3-2</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/bericht-uber-malware-trends-im-oktober-2020</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenschutz-fur-vips-was-wir-aus-dem-hack-von-colin-powells-e-mail-konto-lernen-konnen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-security</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/rethinking-database-security</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/ru/blog</loc><lastmod>2025-02-12</lastmod></url><url><loc>https://www.varonis.com/es/data-security-platform</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ces-10-mythes-de-la-cybersecurite-mettent-ils-votre-entreprise-en-danger</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-is-a-team-sport</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.varonis.com/blog/group-policy-objects</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/concierge</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/behind-the-varonis-rebrand</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/pure-storage-partners</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-5-grosten-bedrohungen-fur-remote-work</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/pesquisa-aponta-que-mais-da-metade-das-empresas-expoem-arquivos-sigilosos-aos-funcionarios/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-secure-google-drive</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-grundlegende-techniken-zum-scannen-von-ports</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-fixes-kerberos-silver-ticket-vulnerability</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/exigences-pci-dss</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/vier-gewinner-und-eine-gro%C3%9Fe-siegerin-die-datensicherheit</loc><lastmod>2024-08-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/webhook-integration</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/stapelspeicher-3</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/mcp-server</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-grunde-warum-unternehmen-eine-alternative-zu-dropbox-wollen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-siem</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.varonis.com/blog/enhancing-saas-security</loc><lastmod>2025-05-07</lastmod></url><url><loc>https://www.varonis.com/blog/least-privilege-automation</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cisos-first-90-days-action-plan-advice</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/blog/pen-testing-active-directory-environments-part-iv-graph-fun</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/free-security-courses</loc><lastmod>2024-10-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-o-uba-deve-receber-mais-investimentos-em-2017</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/60-estatisticas-de-seguranca-para-2018/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/guia-de-compartilhamento-de-arquivos-do-microsoft-office-365</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ransomware-como-ele-impactou-o-governo-e-vai-impactar-a-sua-empresa</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/cmmc-compliance</loc><lastmod>2025-03-19</lastmod></url><url><loc>https://www.varonis.com/blog/ai-data-security-hidden-risks</loc><lastmod>2025-08-29</lastmod></url><url><loc>https://www.varonis.com/blog/security-operations-center-soc</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/atlas-ai-security</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/forensique-memoire</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/eu-ai-act</loc><lastmod>2024-09-13</lastmod></url><url><loc>https://www.varonis.com/blog/identity-blind-spot</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.varonis.com/es/blog/understanding-and-applying-the-shared-responsibility-model</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-jenga-de-la-securite-des-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/rethinking-database-security</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/blog/privilege-access-management</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/coverage</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-terraform</loc><lastmod>2022-06-15</lastmod></url><url><loc>https://www.varonis.com/blog/disabling-powershell-and-other-malware-nuisances-part-iii</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/mitre-attck-framework-complete-guide</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/datensicherheit-in-hybriden-umgebungen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/revert-a-commit-in-git</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-combating-the-cybersecurity-skills-shortage-with-bryan-chnowski</loc><lastmod>2024-11-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/scattered-spider</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-cinco-armadilhas-da-analise-de-dados-e-saiba-como-evita-las</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/microsoft-laps</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/platform/identity-resolution</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/mcp-server</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/it/blog/salesforce-user-impersonation</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/active-directory-im-klartext</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/aktuelle-bka-studie-das-sind-die-tater-im-bereich-cyberkriminalitat</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/ja/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-ganha-novo-premio-em-uba</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/dataflow-rider</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://www.varonis.com/es/coverage/network</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-part-iii-playing-with-rats-and-reverse-shells</loc><lastmod>2022-04-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rbac</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/blog/the-difference-between-organizational-units-and-active-directory-groups</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-extends-security-capabilities-to-nutanix-files</loc><lastmod>2022-01-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-sony-hack-aus-der-sicht-von-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/anti-bot-phishing</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://www.varonis.com/company</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/what-the-new-sec-cyber-disclosure-guidelines-mean-for-your-business</loc><lastmod>2024-08-29</lastmod></url><url><loc>https://www.varonis.com/blog/connect-to-office-365-powershell</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/database-classification</loc><lastmod>2024-02-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/hackers-invadem-perfil-de-atleta-nas-redes-sociais/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/relatorio-de-investigacoes-de-dados-da-verizon-2018</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/diese-vier-fragen-sollten-ceos-ihren-cios-stellen-wenn-sie-sich-vor-den-antworten-nicht-furchten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-data-governance-suite-5-8-plus-rapide-plus-simple-plus-economique</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-riscos-dos-testes-geneticos</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-aktuelle-datenschutzlage-infografik</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/vol-de-donnees-demployes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dados-confidenciais-como-identificar-e-proteger-dados</loc><lastmod>2022-11-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/darkside-analyse-dune-vaste-campagne-de-vols-de-donnees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-adds-file-analysis-to-cloud-data-classification-capabilities</loc><lastmod>2022-12-16</lastmod></url><url><loc>https://www.varonis.com/es/platform/data-access-governance</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/synthetic-sid</loc><lastmod>2022-03-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-varonis-melhora-a-seguranca-de-escritorios-de-advocacia</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-in-the-cloud</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-dam</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-par-ransomware-inspiree-de-petya-ce-que-vous-devez-savoir</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-bedenken-von-branchenkennern-uber-cybersicherheit</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/datensicherheitssoftware-plattformen-besser-als-tools</loc><lastmod>2021-06-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-dsgvo-artikel-in-einfacher-deutscher-sprache</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/the-definitive-guide-to-cryptographic-hash-functions-part-1</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/es/blog/microsoft-partnership</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-delivers-market-leading-salesforce-security-varonis</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/azure-managed-identities</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/pestudio</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/podcast-empfehlung-alles-was-sie-zu-data-security-posture-management-wissen-sollten-0</loc><lastmod>2023-12-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-expertengesprach-was-die-eu-datenschutz-grundverordnung-mit-zugriffkontrolle-zu-tun-hat</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/coverage/salesforce-agentforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/platform/identity-posture</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/databricks</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/compliance-brief-hipaa</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/adventures-in-malware-free-hacking-part-iii</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/big-data-big-brother-2</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/pci-compliance</loc><lastmod>2022-12-16</lastmod></url><url><loc>https://www.varonis.com/ja/blog/oauth-salesforce-apps</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/jetzt-auch-cloudbleed-cloudflare-nutzerdaten-im-netz-veroffentlicht</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/requisitos-do-pci-dss</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-um-vazamento-de-dados-definicao-e-prevencao</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/it/solutions/insider-risk-management</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-nivel-medio-de-leitura-de-uma-politica-de-privacidade</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-mddr</loc><lastmod>2024-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-ebook-wmi-events-and-insider-surveillance</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/it/blog/azure-database-security</loc><lastmod>2024-11-29</lastmod></url><url><loc>https://www.varonis.com/blog/5-reports-data-owners/</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-varonis-data-risk-assessment-works</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/generative-ai-security</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-softwares-anti-virus-ainda-podem-ser-usados</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/copilot-in-healthcare</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-segmentation-reseau</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/how_to_setup_spf_record_to_prevent_spam_and_spearphishing</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/ja/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-discover-gdpr-data-with-varonis</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/blog/url-rewriting-exploit</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estes-sao-os-dez-mitos-de-seguranca-cibernetica-que-colocam-seu-negocio-em-risco</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quest%C3%B5es-de-seguran%C3%A7a-no-open-insurance</loc><lastmod>2022-03-12</lastmod></url><url><loc>https://www.varonis.com/blog/decoding-clickfix</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://www.varonis.com/blog/azure-access-graph</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-plateforme-de-securite-des-donnees-varonis-mentionnee-dans-le-guide-dachat-des-produits-daudit-et-de-protection-des-donnees-2017-de-gartner</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/kerberos-authentication-explained</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/matrixpdf</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/pwc-studie-cyber-kriminalitat-ist-chefsache</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/nist-800-171</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ids-vs-ips</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/servicenow</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-quun-ransomware</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/platform/data-access-governance</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/cloud-datenschutz-in-der-eu-der-weg-aus-der-knechtschaft</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/5-privacy-concerns-about-wearable-technology</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/hiring-the-right-cybersecurity-professionals-with-leah-mclean</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-future-of-tech-with-david-ulloa</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/actualites-azure-28-06</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-dam</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-to-acquire-cyral-database-activity-monitoring</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://www.varonis.com/fr/company</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/why-polp-is-critical-for-ai-security</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://www.varonis.com/trust</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/scaling-accurate-classification</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/it/blog/sspm</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-use-ghidra</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/solutions/ai-security</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blackhat</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-hackers-buy-access</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.varonis.com/it/coverage/salesforce-agentforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dia-zero-ataques-crescem-no-mundo</loc><lastmod>2022-04-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-interceptor</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/arbeiten-mit-lokalen-administratorkonten-unter-windows-teil-ii</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/git-branching</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/saas-risk-report-2021</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-as-recentes-invasoes-nos-ensinam-sobre-senhas-de-acesso</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-july-2025</loc><lastmod>2025-07-31</lastmod></url><url><loc>https://www.varonis.com/blog/security-data-ai-fabric</loc><lastmod>2026-02-27</lastmod></url><url><loc>https://www.varonis.com/customer-stories/varonis-covers-the-blind-spots-for-westminster-schools</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/coverage/salesforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/5-ameacas-a-ciberseguranca-para-ficar-de-olho-em-2018</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-in-the-cloud</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/cybersecurity-tips</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/cmmc-2.0-how-varonis-ensures-certification-for-defense-contractors</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/befindet-sich-ihr-grostes-sicherheitsrisiko-innerhalb-ihres-unternehmens</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/working-in-cybersecurity</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-varonis-helps-with-email-security</loc><lastmod>2023-12-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-1-kalkuliertes-risiko</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/from-table-stakes-to-a-team-sport-rethinking-cybersecurity</loc><lastmod>2025-04-02</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salesforce-einstein-wormhole</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-domain-services</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/es/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/apt-groups</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/it/blog/ai-data-security</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/blog/the-benefits-of-threat-and-data-breach-reports</loc><lastmod>2023-09-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/aktuelle-analyse-der-finra-zu-cyberkriminalitat</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-anuncia-integracao-com-o-salesforce-shield</loc><lastmod>2023-10-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/mehr-datensicherheit-fur-nasuni</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/windows-defender-turned-off-by-group-policy</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/diebstahl-geistigen-eigentums-teil-1-insider-und-ihre-missverstandenen-anspruche</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/spamgpt</loc><lastmod>2025-09-08</lastmod></url><url><loc>https://www.varonis.com/fr/platform/data-centric-ueba</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/platform/dlp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/modele-de-securite-zero-confiance-un-excellent-moyen-de-renforcer-la-protection-des-donnees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-navigating-insurance-technology-with-ralph-severini</loc><lastmod>2025-01-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-desenvolve-novos-modelos-de-seguranca-da-informacao</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-terraform</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/microsoft-copilot-365-security</loc><lastmod>2024-04-26</lastmod></url><url><loc>https://www.varonis.com/fr/case-studies</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenmigration</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/powershell-array</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-recompense-les-laureats-du-prix-partenaires-varonis-2020</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/compare-salesforce-user-permissions-with-ease</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/blog/pure-storage-partners</loc><lastmod>2025-04-21</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/google-cloud</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ajouter-varonis-a-iam-pour-une-meilleure-gouvernance-des-acces</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/escassez-de-talentos-ameaca-a-adocao-de-novas-tecnologias</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/blog/anatomy-of-a-solidbit-ransomware-attack</loc><lastmod>2022-09-02</lastmod></url><url><loc>https://www.varonis.com/blog/ccpa-compliance</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/entenda-a-import%C3%A2ncia-de-um-processo-de-seguran%C3%A7a-razo%C3%A1vel-para-sua-estrat%C3%A9gia</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/proactive-incident-response</loc><lastmod>2023-02-06</lastmod></url><url><loc>https://www.varonis.com/varonis-zoom-meeting</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/shadow-ai</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/it/coverage/windows-file-shares-and-nas</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/reprompt</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ameacas-de-seguranca-estao-partindo-de-dentro-das-empresas</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/metricas-de-resposta-a-incidentes-de-sucesso-dependem-de-avaliacao-constante</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/dpdp-india</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/kerberos-attack-silver-ticket-edition</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/accelerez-la-protection-des-donnees-grace-a-la-sensibilite-au-contexte</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-in-the-cloud</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cloudbleed-o-que-podemos-aprender-com-o-vazamento-de-dados-do-cloudflare</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-quune-plateforme-de-securite-des-donnees</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-dam</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/how-to-find-active-directory-group-member</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/nmap-reverse-proxies</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/engenharia-social-entenda-o-golpe</loc><lastmod>2022-10-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/falha-no-salesforce-pode-expor-dados-sensiveis</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-interceptor</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/bei-hackerangriff-op-verschoben-wie-sicher-sind-krankenhauser-und-patientendaten-wirklich-teil-1</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-leads-dspm-market-on-gartner-peer-insights</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/it/solutions/cloud-data-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/nutzung-von-aws-s3</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tres-desafios-de-seguranca-para-o-trabalho-remoto-ao-redor-do-mundo</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/relatorio-mostra-que-maioria-das-empresas-multinacionais-foram-vitimas-de-ransomware</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tendencias-globais-de-ameacas-e-o-futuro-da-resposta-a-incidentes</loc><lastmod>2023-05-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/trouver-les-donnees-a-caractere-personnel-visees-par-la-loi-de-lue-grace-a-gdpr-patterns</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-access-graph</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/verschlusselung-hat-ihre-grenzen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/malware-protection</loc><lastmod>2022-04-04</lastmod></url><url><loc>https://www.varonis.com/de/coverage/chatgpt-enterprise</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-neuigkeiten-08-09</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/cloud-data-security-best-practices</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/es/blog/-hoja-de-ruta-de-seguridad-de-datos</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-ataques-contra-a-seguranca-da-informacao-vao-piorar</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/juristischer-spickzettel-in-sachen-ransomware</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/security-data-ai-fabric</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-when-lives-depend-on-strong-security-with-john-mason</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-mddr</loc><lastmod>2024-06-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/mcp-server</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/ids-vs-ips</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/zero-trust-guia-completo</loc><lastmod>2022-11-15</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/databases</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/es/coverage/databricks</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cloud-data-security-best-practices</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/blog/bad-rabbit-ransomware</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes</loc><lastmod>2024-02-02</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-migration-des-donnees-cest-comme-les-antibiotiques-ce-nest-pas-automatique</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/windows-10-authentication-the-end-of-pass-the-hash</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/consideracoes-sobre-os-padroes-de-seguranca-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/zwei-mal-gekippt-jetzt-wieder-da-die-vorratsdatenspeicherung-ist-durch</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-lasst-sich-aws-s3-sicherheit-besser-strukturieren</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-iam</loc><lastmod>2025-02-05</lastmod></url><url><loc>https://www.varonis.com/it/blog/what-is-oauth</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/es/blog/microsoft-copilot-365-security</loc><lastmod>2024-11-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/compare-salesforce-user-permissions-with-ease</loc><lastmod>2022-10-13</lastmod></url><url><loc>https://www.varonis.com/blog/snowflake-goat</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/platform/athena-ai</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/webhook-integration</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utiliser-varonis-les-dessous-de-la-classification-des-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-masking</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-for-confluence</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-may-2025</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/taking-microsoft-office-by-storm</loc><lastmod>2023-08-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/m365-bec-attack</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/salt-typhoon</loc><lastmod>2025-03-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/video-varonis-dsgvo-risikobewertung</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/spiderman-phishing-kit</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://www.varonis.com/es/blog/dspm-buyers-guide</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/proteja-sua-rede-das-novas-vulnerabilidades-meltdownprime-e-spectreprime</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/platform/data-discovery-and-classification</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/automate-data-security-with-varonis-data-centric-insights-and-cortex-xsoar</loc><lastmod>2022-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/box-mfa-bypass-totp</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/microsoft-copilot-365-security</loc><lastmod>2024-11-05</lastmod></url><url><loc>https://www.varonis.com/blog/eternalrocks</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-utiliser-x64dbg</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/proteja-seus-dados-de-vendas</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/es/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/platform/concierge-services</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/deepfakes-and-voice-clones</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/jira-permissions</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/services-de-domaine-active-directory-ad-ds-presentation-et-fonctions</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/black-basta</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/synthetic-sid</loc><lastmod>2024-05-11</lastmod></url><url><loc>https://www.varonis.com/ja/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/entrepreneurial-rats-alienspy-and-taas-trojans-as-a-service</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securiser-acces-applications-web-azure</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-vishing-threat-unc604</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/modele-arm</loc><lastmod>2021-10-26</lastmod></url><url><loc>https://www.varonis.com/blog/automated-data-labeling</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-conectar-sua-estrategia-de-dados-e-analytics-ao-negocio</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/ciso-security-plan</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-mais-sobre-as-probabilidades-de-um-ataque-cibernetico</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-targets-aws-s3-buckets</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/blog/dns-security</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-um-ataque-de-forca-bruta/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-buyers-guide</loc><lastmod>2024-03-13</lastmod></url><url><loc>https://www.varonis.com/blog/introducing-varonis-uba-threat-models</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/it/platform/dlp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-metasploit</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-dinge-die-sie-uber-big-data-wissen-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/forrester-wave-data-security-platforms</loc><lastmod>2023-03-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-detecter-les-attaques-dns</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/ja/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nuvem-e-o-proximo-alvo-do-ransomware/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/lapsus-violacao-de-autentic%C3%A5acao-multifator-impactou-centenas-de-empresas</loc><lastmod>2022-05-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/relier-les-points-entre-phishing-donnees-dorigine-humaine-et-donnees-compromises</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/iaas</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-datadvantage-contribue-a-eliminer-les-effets-des-virus</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-le-dns-tunneling-guide-de-detection</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/scattered-spider</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-dns-ist-wie-es-funktioniert-und-schwachstellen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/coverage/databases</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-drees-homes-got-up-and-running-in-the-cloud-quickly</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/zendesk-sql-injection-and-access-flaws</loc><lastmod>2022-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/massive-ransomware-outbreak-what-you-need-to-know</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/brute-force-die-anatomie-eines-angriffs</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/supercharging-threat-detection-with-agentic-ai</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/salesforce-site-exposure</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-an-it-security-ops-manager-tackles-risk</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ein-domanen-controller-wann-wird-er-gebraucht-und-eingerichtet</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/ereignisreaktionsplan</loc><lastmod>2022-05-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-virtual-network</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-de-lediteur-de-strategie-de-groupe-configuration-et-utilisation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gdpr-faites-vos-devoirs-et-limitez-les-risques-damende</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-prevents-ransomware-disaster</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ameaca-interna-como-detectar-e-prever</loc><lastmod>2023-04-20</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-introduces-athena-ai</loc><lastmod>2023-11-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/malware-do-ponto-de-venda-assombra-os-hoteis/</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/face-app-polemique</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/education-cybersecurity-statistics</loc><lastmod>2024-10-03</lastmod></url><url><loc>https://www.varonis.com/de/solutions/data-lifecycle-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/brasil-ransomware-coloca-o-pais-entre-a-lista-dos-10-mais-afetados-no-mundo</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-benefits-of-simplicity-with-mark-bruns</loc><lastmod>2024-03-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/offene-freigaben-in-den-griff-bekommen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/whaling-attack</loc><lastmod>2022-10-12</lastmod></url><url><loc>https://www.varonis.com/blog/social-media-security</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-protect-your-cloud-environment-from-todays-top-5-threats</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-na-nuvem</loc><lastmod>2023-08-29</lastmod></url><url><loc>https://www.varonis.com/blog/authorized-access-understanding-how-us-laws-affect-your-authorization-policies-by-ken-spinner</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-bicep-2</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/10-tipps-wie-sie-ihre-daten-am-besten-schutzen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/product-training</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/sox-compliance</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/blog/flow-monitoring</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataque-a-equifax-como-proteger-seus-dados-online</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tendencias-de-ransomware-que-voce-precisa-conhecer</loc><lastmod>2022-10-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/maioria-das-empresas-ja-enviou-arquivos-sensiveis-por-engano</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis.com/blog/data-lifecycle-automation</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-bedrohungen-teil-4-die-schlussfolgerungen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/busca-corporativa-obtenha-insights-dos-seus-dados-nao-estruturados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/varonis-automated-data-security-every-second-everywhere</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-security-vs-data-resilience-tools</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-diferenca-entre-um-virus-e-um-worm-de-computador/</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-use-volatility</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/red-teaming-2</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/beurteilung-und-verbesserung-ihres-aktuellen-risikoprofils</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/microsoft-teams-sicherheit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/data-security-posture-management-dspm-guia-de-praticas-recomendadas-para-cisos</loc><lastmod>2023-06-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/norman-cryptominer-monero</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ich-klicke-also-bin-ich-verstorende-forschungsergebnisse-zum-phishing</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-softcat-deployed-m365-copilot-safely</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-casb</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/exchange-vulnerability-how-to-detect-domain-admin-privilege-escalation</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cfo-tambem-podem-influenciar-a-politica-de-seguranca-da-empresa</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/wikileaks-und-ransomware-erpressung-an-der-tagesordnung</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ransomware-cyptmix-destina-valor-de-resgate-para-a-caridade</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/it/blog/artificial-intelligence-security</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tarefas-de-seguranca-cibernetica-ignoradas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/fique-atento-as-vulnerabilidades-dos-hoteis</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/coinbase-breach</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salesforce-user-impersonation</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/integre-educacao-do-usuario-ao-seu-programa-de-seguranca/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/a-guide-to-ai-data-security</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-scanning</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/expertentipps-30-terabyte-1-300-nutzer-und-400-smb-freigaben</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/company/corporate-responsibility</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/digitale-spionage-eine-reale-bedrohung</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/blog/government-hacking-exploits</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/guia-sobre-ransomware-tipos-e-definicoes-de-ataques-de-ransomware</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-dangers-of-data-poisoning-with-avi-yoshi</loc><lastmod>2024-10-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/schutzen-sie-ihre-daten-mit-super-einfachen-dateisicherheitstricks</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/pure-storage-partners</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/secure-snowflake-data</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/least-privilege-automation</loc><lastmod>2025-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-exploring-the-virtual-ciso-role-with-robert-blythe</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-gerenciar-as-permissoes-no-ambiente</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/office-365-migration</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-dam</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-ha-de-novo-na-varonis</loc><lastmod>2023-10-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/krack-attack-ce-que-vous-devez-savoir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/connecting-your-data-strategy-to-analytics-eight-questions-to-ask</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/platform/database-activity-monitoring</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/it/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/proteger-donnees-gdpr-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/soc-2-compliance</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/reality-leah-winner-und-das-zeitalter-der-insider-risiken</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/programming-languages</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/trabalho-remoto-10-dicas-para-proteger-o-ad</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/closer-look-pass-hash-part-one</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-anatomie-einer-datenschutzverletzung-das-beispiel-sony</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/a-brief-history-of-ransomware</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/7-tipps-zur-vermeidung-von-datendiebstahl-durch-mitarbeiter</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/automated-dspm</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-gwinnett-county-public-schools-relies-on-proactive-incident-response</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cyberseguranca-o-que-e-cross-site-scripting-e-que-ameacas-ele-traz</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/events</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.varonis.com/blog/healthcare-data-security-report</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-donnees-de-votre-systeme-daudit-prennent-trop-de-place-lisez-la-suite</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/training-labs</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-october-2024</loc><lastmod>2024-10-31</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/veja-tudo-o-que-voce-precisa-saber-sobre-os-ataques-de-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-dashboard</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-eu-datenschutz-grundverordnung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/security-risks-to-your-salesforce-org</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/modelagem-de-amea%C3%A7as-6-erros-que-voc%C3%AA-provavelmente-est%C3%A1-cometendo</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-sentinel-anleitung</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/the-malware-hiding-in-your-windows-system32-folder-part-iii-certutil-and-alternate-data-streams</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/aventuras-em-ataques-sem-malware/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/ja/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-quais-sao-os-erros-mais-comuns-na-estrategia-de-resposta-a-incidentes</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/sva-ist-unser-excellence-partner-of-the-year</loc><lastmod>2023-07-05</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-tampa-general-hospital-safely-deployed-m365-copilot</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/schlusselfragen-an-vorstand-und-geschaftsfuhrung-in-sachen-cybersicherheit</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/customer-success</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://www.varonis.com/it/blog/git-branching</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/windows-powershell-tutorials</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-trends</loc><lastmod>2024-06-19</lastmod></url><url><loc>https://www.varonis.com/blog/endpoint-detection-and-response-edr</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/speicherforensik</loc><lastmod>2023-04-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estrutura-de-gerenciamento-de-risco-rmf-uma-visao-geral</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/company-reputation-after-a-data-breach</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-panama-papers-datenlecks-von-diesem-ausmas-die-neue-normalitat</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-uns-magic-kingdom-in-sachen-authentifizierung-lehrt-kerberos-aus-der-nahe-betrachtet-teil-ii</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-memo-templates</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/ja/blog/multi-cloud-identity</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/blog/federal-data-security-challenges</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/facilite-as-investigacoes-digitais-forenses/</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/secure-file-sharing</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/conseils-de-pros-meilleures-pratiques-de-gestion-des-grandes-quantites-de-donnees-partagees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/boosting-security-and-visibility-of-unstructured-data</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/fur-eine-maximale-investitionsrendite-arbeiten-nach-dem-prinzip-der-notwendigsten-berechtigung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/types-of-malware</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-uba-e-ueba-colocam-em-evidencia-ameacas-ocultas</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vulnerabilidade-do-windows-bluekeep-voce-ja-viu-esse-filme</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/nur-gut-fur-kritische-infrastrukturen-warum-it-sicherheit-strategische-prioritat-braucht</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/aws-misconfigurations-expose-data</loc><lastmod>2024-08-22</lastmod></url><url><loc>https://www.varonis.com/blog/a-guide-to-ai-data-security</loc><lastmod>2025-06-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dicas-importantes-de-seguranca-cibernetica</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/blog/password-spraying</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://www.varonis.com/es/platform/data-discovery-and-classification</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/cloudpro-ist-geheimhaltung-das-fehlende-glied-bei-der-cloud-sicherheit</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/top-ai-security-questions</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-uma-floresta-do-active-directory/</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estatisticas-de-ransomware-que-voce-deve-conhecer-em-2022</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/identity-blind-spot</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/conversation-nyu-polys-professor-justin-cappos-data-security-lessons-tips-companies</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-indicadores-de-riscos-no-seu-dashboard-varonis-do-ad</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-zero-trust</loc><lastmod>2022-08-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/mirai-attack-e-a-vinganca-da-internet-das-coisas/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/platform/changelog</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/mcp-server</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/threat-modeling</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/dnsmessenger-rat</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/smarter-federal-security</loc><lastmod>2025-06-11</lastmod></url><url><loc>https://www.varonis.com/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/violacao-de-dados-cresce-no-brasil</loc><lastmod>2022-05-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-devo-usar-o-user-behavior-analytics-uba</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/secure-snowflake-data</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-funktioniert-die-kerberos-authentifizierung</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/6-der-haufigsten-falle-in-denen-regierungs-hacker-sicherheitslucken-ausnutzen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/relatorio-da-verizon-aponta-os-mesmos-velhos-problemas-em-seguranca-de-dados</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/warum-sie-ihre-passworter-fur-sich-behalten-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-to-acquire-cyral-database-activity-monitoring</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-primeiros-90-dias-de-um-ciso-plano-de-acao-e-conselhos</loc><lastmod>2023-10-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-leads-dspm-market-on-gartner-peer-insights</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.varonis.com/blog/deepbluemagic-ransomware</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/reparer-les-permissions-windows</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/ai-at-work</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.varonis.com/blog/introducing-gdpr-patterns-and-dataprivilege-api</loc><lastmod>2022-12-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/shadow-ai</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/windows-powershell-tutorials</loc><lastmod>2023-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-controverses-relatives-au-rgpd-de-lue-infographie</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-in-the-cloud</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/npm-hijacking</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.varonis.com/customer-stories/securing-financial-data-and-pii-with-remediation-tools</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/qual-a-diferenca-entre-dpl-siem-e-solucoes-de-seguranca-da-varonis/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-einem-computer-virus-und-einem-computer-wurm</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/phishing-lektionen-phishing-im-eigenen-dateisystem</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/solutions/policy-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/exploiting-vpc-endpoints-for-s3buckets</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/protecao-contra-malware-conheca-as-melhores-praticas/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-managed-identities</loc><lastmod>2022-10-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/elimine-as-contas-inativas-para-garantir-a-privacidade-dos-dados-sensiveis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ai-data-security</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/blog/sql-server-best-practices-part-configuration</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/how-major-companies-find-leaks</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/leitfaden-zur-pci-dss-3-2-compliance-checkliste-der-dos-and-donts</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/coverage/servicenow</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-in-the-cloud</loc><lastmod>2024-03-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/botnets-sao-ainda-um-grande-problema-na-america-latina</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-8.6-control-collaboration-chaos-in-microsoft-365-varonis</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/es/solutions/insider-risk-management</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/blog/ai-security</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-autoruns</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/blog/practical-powershell-for-it-security-part-i-file-event-monitoring</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-create-a-good-security-policy</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/illinois-privacy-law</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/revil-ransomware-angriff-auf-kaseya-vsa-was-sie-wissen-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/url-spoofing</loc><lastmod>2022-08-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/the-identity-crisis-research-report</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/blog/4-step-guide-to-managing-network-share-permissions</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-c2</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/coverage/google-cloud</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-aprendemos-com-o-roubo-de-dados-da-empresa-goldcorp/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salesforce-shield</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/optimiser-votre-retour-sur-investissements-maintien-dun-modele-de-moindre-privilege</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/es/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/blog/xz-backdoor-supply-chain-jump-scare</loc><lastmod>2024-04-05</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-microsoft-teams</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/eu-datenschutzreform-nimmt-fahrt-auf</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-july-2024</loc><lastmod>2024-07-25</lastmod></url><url><loc>https://www.varonis.com/blog/open-shares-by-david-gibson</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/blog/a-guide-on-the-data-lifecycle-identifying-where-your-data-is-vulnerable</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/es/security-ecosystem-integrations</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/machen-sie-ihre-dsgvo-hausaufgaben-und-reduzieren-sie-damit-die-gefahr-von-strafzahlungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/process-hacker</loc><lastmod>2022-11-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/10-tips-to-pay-back-your-salesforce-technical-debt</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-conformite-pci-prescriptions-et-penalites</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-casse-tete-du-vol-de-propriete-intellectuelle-quatrieme-partie-des-pirates-internes-ambitieux</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/working-in-cybersecurity</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/adventures-malware-free-hacking-part-v</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/ciso-security-plan</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-enhances-cloud-security-alerts-with-mitre-attck-tactics</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/platform/data-discovery-and-classification</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-daten-governance-und-it-governance</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/es/platform/data-centric-ueba</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/cifs-vs-smb</loc><lastmod>2025-03-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/un-nouveau-tableau-de-bord-de-la-securite-un-moteur-danalyse-des-comportements-enrichi-et-plus-encore</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-enhances-cloud-security-alerts-with-mitre-attck-tactics</loc><lastmod>2022-10-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/benachrichtigungen-in-echtzeit-und-uberwachung-mit-varonis-datalert</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-sie-dsgvo-daten-mit-varonis-schutzen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-zero-trust</loc><lastmod>2024-09-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/exportkontrolle-fur-daten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/yara-rules</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/sspm</loc><lastmod>2023-07-04</lastmod></url><url><loc>https://www.varonis.com/it/blog/eu-ai-act</loc><lastmod>2024-09-13</lastmod></url><url><loc>https://www.varonis.com/blog/commvault-metallic-vulnerability</loc><lastmod>2025-06-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-07-26</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/scattered-spider</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-10-servicos-de-compartilhamento-de-arquivos</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/li%C3%A7%C3%B5es-dos-vazamentos-de-e-mails-de-pol%C3%ADticos-e-executivos</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-securite-des-donnees-en-2017-tous-pirates-et-en-2018</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/anleitung-fur-die-journal-und-diagnosefunktion-in-exchange</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/dropbox-sign-data-breach</loc><lastmod>2024-05-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-torre-de-jenga-da-seguranca-da-informacao</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-identity-protection</loc><lastmod>2025-06-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-uso-da-inteligencia-profunda-no-combate-ao-crime-cibernetico/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/seo-poisoning</loc><lastmod>2025-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/how-to-use-wireshark</loc><lastmod>2022-04-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-eu-richtlinie-fur-netz-und-informationssicherheit</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/wirtschaftsschutz-im-digitalen-zeitalter</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/another-look-at-folder-permissions-beyond-aglp</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/power-automate-data-exfiltration</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/malware-coding-lessons-people-part-learning-write-custom-fud-fully-undetected-malware</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/de/solutions/sspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-ganhamos-com-a-minimizacao-de-dados-na-rede</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/why-every-cybersecurity-leader-should-assume-breach</loc><lastmod>2022-05-16</lastmod></url><url><loc>https://www.varonis.com/blog/attack-lab-spear-phishing-with-google-drive-sharing</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/revil-msp-supply-chain-attack</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/coverage/confluence</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/introducing-the-automation-engine-datalert-analytics-rewind-and-more</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-x64dbg-malware-analysis</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/visualize-your-risk-with-the-datalert-dashboard</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/lapsus</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/automated-dspm</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.varonis.com/blog/samas-cerber-surprise-three-new-ransomware-variants-to-have-on-your-radar</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/okta-attack-vectors</loc><lastmod>2023-02-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-active-directory</loc><lastmod>2022-02-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/samas-cerber-surprise</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/10-tips-to-pay-back-your-salesforce-technical-debt</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/processo-e-o-fator-mais-importante-na-prevencao-de-invasoes-2</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/rippling-vs-deel</loc><lastmod>2025-03-24</lastmod></url><url><loc>https://www.varonis.com/es/coverage/microsoft-365</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-phishing-de-pdg-les-pirates-ciblent-les-donnees-a-forte-valeur</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-difference-entre-windows-server-active-directory-et-azure-ad</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-verschleierung-unerkannt-durch-verwirrung-teil-ii</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/microsoft-partnership</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/ja/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/saas-data-risk-report</loc><lastmod>2022-10-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-a-botnet</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-garantir-o-melhor-gerenciamento-de-dados-nao-estruturados</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/customer-stories/protecting-against-ransomware</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/fsmo-roles</loc><lastmod>2022-04-11</lastmod></url><url><loc>https://www.varonis.com/blog/multi-cloud-identity</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/misconfigured-salesforce-experiences</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/es/blog/configuration-drift</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://www.varonis.com/es/blog/secure-snowflake-data</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/blog/protect-your-data-with-super-easy-file-security-tricks</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-zero-trust-um-modelo-de-seguranca</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/datanywhere-verwandelt-dateifreigaben-in-sichere-filesharing-systeme-fur-unternehmen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/nouveau-datanywhere-1-5</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cloud-security-programs</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/getting-the-most-out-of-data-transport-engine</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/confluence</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/mind-games</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/von-juristen-daten-und-stunden-die-sich-verrechnen-lassen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/une-attaque-de-ransomware-constitue-t-elle-une-violation-de-donnees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/solutions/data-risk-assessment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/verizon-report-zur-pci-compliance-gute-und-schlechte-nachrichten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/red-teaming</loc><lastmod>2022-07-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-neuigkeiten-28-06</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/rbac</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/ddos-was-ist-ein-distributed-denial-of-service-angriff</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-implantar-novos-elementos-a-estrutura-de-seguranca</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/coverage/snowflake</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/ponemon-studie-wo-unternehmenssicherheit-ihre-lucken-hat</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/network-access-control-nac</loc><lastmod>2022-07-08</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-jargon-translated</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/blog/ueba-buyers-guide</loc><lastmod>2025-05-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-cinco-mitos-de-seguranca-digital-que-mais-colocam-seu-negocio-em-risco/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/gestao-de-dados-nem-sempre-mais-e-melhor</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/siem-tools-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/customer-stories/scaling-data-protection</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quem-vai-pagar-a-divida-do-ransomware</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/cerber-ransomware</loc><lastmod>2022-04-04</lastmod></url><url><loc>https://www.varonis.com/blog/koadic-lol-malware-meets-python-based-command-and-control-c2-server-part-i</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/es/blog/pure-storage-partners</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-tackling-federal-cybersecurity-challenges-with-aj-forysiak</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/blog/the-difference-between-active-directory-and-ldap</loc><lastmod>2022-01-05</lastmod></url><url><loc>https://www.varonis.com/blog/closer-look-pass-hash-part-iii-ntlm-will-get-hacked</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/itar-compliance</loc><lastmod>2023-02-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/outils-siem-varonis-est-la-solution-qui-exploite-au-mieux-votre-gestion-des-evenements-et-informations-de-securite</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/advanced-persistent-threat</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/solutions/compliance-management</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/phishing-5-vetores-de-ataques</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/cybercrime-im-21-jahrhundert-reine-verteidigung-hinkt-hinterher</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/une-nouvelle-information-personnelle-les-photos-de-plaques-dimmatriculation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/pgp-encryption</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-19-10</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-12-10</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/toolshell-sharepoint-rce</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/industry/manufacturing</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/menaces-internes-guide-ciso</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/whats-difference-hacking-phishing</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/group-policy-best-practices</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/california-privacy-rights-act</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-automation-saves-time-and-keeps-data-secure-at-cintas</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/gerenciamento-da-rede-corporativa-e-essencial-para-evitar-propagacao-de-ameacas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/annonce-de-varonis-edge-vers-le-perimetre-et-au-dela</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-proteger-seu-ambiente-de-nuvem-das-5-principais-ameacas-atuais</loc><lastmod>2023-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-vs-cspm</loc><lastmod>2025-06-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-for-cisos</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/es/platform/database-activity-monitoring</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-bedrohungen-teil-3-mittel-und-gelegenheit</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-a-vpns-e-industria-de-saude-lideram-os-maiores-riscos-ciberneticos-de-2021/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/pci-dss-3-0-und-kunftige-versionen-fokus-prufungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/forrester-wave-data-security-platforms-2025</loc><lastmod>2025-03-04</lastmod></url><url><loc>https://www.varonis.com/blog/misconfigured-upload-path</loc><lastmod>2025-08-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aws-resource-control-policies</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/einigkeit-in-der-fuhrungsetage-wie-fuhrungskrafte-und-it-sicherheitsverantwortliche-uber-die-grosten-cyberbedrohungen-denken</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-prepare-for-a-salesforce-permissions-audit</loc><lastmod>2022-09-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/wir-stellen-vor-datadvantage-cloud-datenzentrierte-sicherheit-fur-saas-und-iaas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/configuration-drift</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/incursion-dans-le-piratage-sans-malware-partie-ii</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/scaling-accurate-classification</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/smb-port</loc><lastmod>2022-03-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/usuarios-com-acesso-privilegiado-sao-seu-maior-problema</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-that-deletes-your-files</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/canadas-pipeda-breach-notification-regulations-finalized</loc><lastmod>2022-05-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/sharepoint-meilleures-pratiques-daffectation-de-droits</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/deepseek</loc><lastmod>2025-02-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/zendesk-sql-injection-and-access-flaws</loc><lastmod>2022-11-24</lastmod></url><url><loc>https://www.varonis.com/it/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-serta-simmons-bedding-uses-varonis-to-secure-salesforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/frostbyte</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aide-memoire-sur-les-permissions-sharepoint</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/big-data-big-brother</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-dam</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/un-controleur-de-domaine-active-directory-ad-dc-na-pas-pu-etre-contacte-resolu</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/windows-bluekeep-vulnerability-deja-vu-again-with-rdp-security-weaknesses</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/hacker-tales-mit-einem-kleinen-unfall-fing-alles-an-teil-1</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/infrastructure-as-code</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.varonis.com/blog/security-audit</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/italys-ai-risks-in-healthcare</loc><lastmod>2025-08-13</lastmod></url><url><loc>https://www.varonis.com/blog/office-365-hipaa</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/os-ransomwares-combinam-com-as-defesas-cibern%C3%A9ticas-automatizadas</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/netzwerkdatenflussuberwachung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-do-blockchain-e-um-exemplo-a-ser-seguido</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-news-07-26</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-reglement-general-sur-la-protection-des-donnees-de-lue-est-desormais-une-loi-a-part-entiere-voici-les-elements-essentiels-a-connaitre</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-part-iv-making-the-lateral-move</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/living-off-the-land-lol-with-microsoft-part-ii-mshta-hta-and-ransomware</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/amazon-redshift</loc><lastmod>2024-07-05</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-proteger-seu-e-mail-da-engenharia-social</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/locky-chiffre-les-donnees-stockees-localement-et-partagees-sur-des-reseaux-non-mappes</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/synthetic-sid</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/the-difference-between-active-directory-and-ldap</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/snowflake-data-security</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://www.varonis.com/training-certifications</loc><lastmod>2025-01-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/soziale-aspekte-und-datenschutz-beim-thema-unternehmensweite-suche</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/eine-datenzentrierte-strategie-was-kann-sie-und-welche-voraussetzungen-mussen-erfullt-sein</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-data-security-roadmap-for-cisos</loc><lastmod>2023-11-07</lastmod></url><url><loc>https://www.varonis.com/blog/top-ai-security-questions</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.varonis.com/blog/create-custom-gpt</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/curiosidade-e-principal-aliada-dos-ataques-de-phishing</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/cisos-first-90-days-action-plan-advice</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/investigate-ntlm-brute-force</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/platform/email-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/it/blog/italys-ai-risks-in-healthcare</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-expertengesprach-zu-privacy-by-default</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/video-varonis-evaluation-de-risques-relatifs-au-gdpr</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/frostbyte-leaderboard</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quelques-reflexions-sur-les-normes-de-securite-des-donnees</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/grose-datenmengen-und-datenschutz-der-reidentifizierung-widerstehen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-sql-injection</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-identity-protection-salesforce</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-setup-your-dns-server-like-north-korea</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/blog/cves-in-openprinting-cups</loc><lastmod>2024-09-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/connect-to-office-365-powershell</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-varonis-helps-with-email-security</loc><lastmod>2023-12-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/5-preocupacoes-com-seguranca-cibernetica/</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/sspm</loc><lastmod>2023-07-04</lastmod></url><url><loc>https://www.varonis.com/it/blog/snowflake-data-security</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cooperacao-e-a-melhor-estrategia-de-seguranca</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/free-data-wrangling-tools</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/hackers-usam-novas-tecnicas-para-ganhar-controle-no-windows</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/counter-strike-servicenow</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/ssl-und-tls-1-0-reichen-nicht-mehr-fur-pci-compliance</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-droit-a-loubli-et-lintelligence-artificielle</loc><lastmod>2023-10-19</lastmod></url><url><loc>https://www.varonis.com/blog/getting-started-powershell-option-inputs</loc><lastmod>2022-02-21</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-cyber-espionage</loc><lastmod>2022-06-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-trois-principaux-problemes-de-securite-de-sharepoint</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/analyser-la-reputation-entreprise-apres-une-violation-de-donnees</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-diferen%C3%A7a-entre-o-provisionamento-de-usu%C3%A1rios-e-o-gerenciamento-de-acesso-a-dados-do-identity-and-access-management-iam</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/eu-datenschutz-grundverordnung-5-punkte-die-sie-kennen-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-breach-statistics</loc><lastmod>2023-01-16</lastmod></url><url><loc>https://www.varonis.com/blog/lessons-from-the-twitch-data-leak</loc><lastmod>2021-12-22</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-migration-tool</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/third-party-app-risk-saas</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-classification-deep-dive</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quanto-custa-uma-violacao-de-dados</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-o-cryptolocker/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/automatisation-du-nettoyage-des-droits-analyse-approfondie-du-roi</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/6-maneiras-de-proteger-o-active-directory-com-a-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-management-des-big-data-sur-votre-nas-rendu-facile</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/aws-access-graph</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://www.varonis.com/fr/blog/je-clique-donc-je-suis-une-etude-troublante-sur-le-phishing</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/platform/dspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/ai-data-classification</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-strategies-for-a-gen-ai-world-expert-qa</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/spiderman-phishing-kit</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/the-difference-between-data-governance-and-it-governance</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/endpoint-detection-and-response-edr-alles-was-sie-wissen-mussen</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/es/solutions/ransomware-prevention</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-thinking-from-a-cyberattackers-perspective</loc><lastmod>2024-12-09</lastmod></url><url><loc>https://www.varonis.com/de/platform/athena-ai</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/disabling-powershell-malware-nuisances-part</loc><lastmod>2022-04-25</lastmod></url><url><loc>https://www.varonis.com/coverage/databricks</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gestion-risques-supply-chai</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/coverage/google-cloud</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/box-mfa-bypass-totp</loc><lastmod>2022-02-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/kerberos-angriffe-wie-lassen-sich-golden-tickets-stoppen</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/malware-analysetools</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sox-compliance</loc><lastmod>2022-03-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/powershell-array</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-threat-playbook</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cism-ou-cissp-quelle-est-la-certification-la-mieux-adaptee-dans-votre-cas</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/frostbyte-challenge</loc><lastmod>2025-12-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/concierge</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-splunk-turbine-a-deteccao-e-a-investigacao</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-user-impersonation</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://www.varonis.com/it/coverage/aws</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/we-need-to-talk-about-gramm-leach-bliley-glb-the-safeguards-rule-will-be-changing</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/blog/infosec-information-security-podcast</loc><lastmod>2022-05-19</lastmod></url><url><loc>https://www.varonis.com/it/solutions/compliance-management</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/pci-dss-requirements</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-this-fortune-500-company-automates-data-security</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-introduces-athena-ai</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/es/platform/identity-resolution</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/plan-reponse-incidents</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/nous-ne-pouvons-pas-auditer-nos-vies-mais-nous-pouvons-auditer-nos-donnees</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/compliance-management</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-oauth</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/gerustet-fur-die-eu-datenschutz-grundverordnung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/nsa-goodness-shadow-brokers-release-unitedrake</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/licoes-da-ciber-espionagem-para-a-seguranca-das-empresas/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes</loc><lastmod>2025-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/7-key-risk-indicators-in-the-dashboard</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/blog/white-hat-hacker</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/state-of-data-security-report</loc><lastmod>2025-06-20</lastmod></url><url><loc>https://www.varonis.com/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/incident-response-team</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/north-carolina-proposes-tougher-breach-notification-rules</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-custo-de-uma-invasao-ao-big-data-parte-iii</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/using-varonis-who-owns-what</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/migracao-de-dados-um-guia-para-o-sucesso/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-array</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/fsmo-roles</loc><lastmod>2023-02-10</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-security-tips</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://www.varonis.com/blog/data-masking</loc><lastmod>2025-06-20</lastmod></url><url><loc>https://www.varonis.com/es/coverage/aws</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/exfiltrate-ntlm-hashes</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/unternehmenswachstum-vorantreiben-effizienter-arbeiten-risiken-besser-managen-der-5-punkte-plan-fur-einen-cdo</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/dspm-use-cases</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/entenda-a-diferenca-entre-active-directory-e-ldap</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/git-branching-and-merging</loc><lastmod>2025-09-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-elaborer-une-bonne-strategie-de-securite</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-zero-trust</loc><lastmod>2022-08-18</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-careers</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/model-poisoning</loc><lastmod>2025-08-22</lastmod></url><url><loc>https://www.varonis.com/blog/data-classification-amazon-s3</loc><lastmod>2024-02-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-de-ransomware-e-se-sua-linha-de-defesa-falhar</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/platform/email-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/getting-ready-for-salesforce-agentforce</loc><lastmod>2025-02-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/salesforce-compare-as-permissoes-de-usuario-facilmente</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-o-pokemon-go-pode-impactar-a-seguranca-do-seu-negocio</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-flow-control-group-automated-data-security-outcomes</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ein-smb-port-und-erklarung-der-ports-445-und-139</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-de-ransomware-impactam-setor-financeiro</loc><lastmod>2022-06-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estatisticas-e-tendencias-de-ciberseguranca-atualizado-em-2023</loc><lastmod>2023-05-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/protocole-smb-explication-des-ports-445-et-139</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/motivacoes-de-um-hacker-bandeira-vermelha-e-prevencao/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/healthcare-cybersecurity-statistics</loc><lastmod>2025-04-04</lastmod></url><url><loc>https://www.varonis.com/blog/7-wi-fi-security-tips-avoid-being-easy-prey-for-hackers</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-quais-sao-as-ameacas-internas-mais-perigosas</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-os-especialistas-dizem-sobre-o-gdpr/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/psd2</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/guia-de-migracao-de-dados-sucesso-estrategico-e-praticas-recomendadas</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-o-cryptojacking-conheca-dicas-de-prevencao-e-deteccao/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-threats</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-um-sistema-de-permissoes-ajuda-voce-a-reduzir-custos</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/configuration-drift</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-opens-new-australian-data-centre</loc><lastmod>2023-04-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/yara-regeln</loc><lastmod>2025-01-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/zendesk-sql-injection-and-access-flaws</loc><lastmod>2022-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/pestudio</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomhub</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-ghost-sites</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/forrester-cita-varonis-por-capacidades-de-classificacao-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ai-data-classification</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-14-12</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/12-ways-varonis-mergers-and-acquisitions</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-reseaux-sociaux</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/es/blog/disable-salesforce-public-links</loc><lastmod>2024-07-26</lastmod></url><url><loc>https://www.varonis.com/blog/government-community-cloud-gcc</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/copilot-in-healthcare</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/es/blog/azure-database-security</loc><lastmod>2024-11-29</lastmod></url><url><loc>https://www.varonis.com/blog/synthetic-sid</loc><lastmod>2023-09-12</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-exela-pharama-sciences-locks-down-data-with-varonis-mddr</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/it/coverage/saas</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-diante-dos-novos-limites-da-rede</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tire-o-maximo-do-user-behaviour-analytics-uba</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/portee-variable-powershell</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ausbreitung-der-an-petya-angelehnten-ransomware-was-sie-jetzt-wissen-mussen</loc><lastmod>2023-12-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/github-secrets-discovery</loc><lastmod>2023-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/privileged-access-management</loc><lastmod>2022-02-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/utilize-inteligencia-artificial-e-machine-learning-para-adequacao-a-gdpr</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-scanning</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.varonis.com/blog/us-privacy-laws</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/gartner-customers-choice-file-analysis</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gmsa</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/roi-of-copilot</loc><lastmod>2024-05-29</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/cloud-data-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/microsofts-expiring-passwords</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/fr/company/contact</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ameliorer-le-controle-dacces-sans-provoquer-une-emeute</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/office-365-migration</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-e-reconhecida-pelo-gartner-no-market-guide-para-user-and-entity-behaviour-analytics</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/stanley-malware-kit</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-importancia-dos-testes-de-penetracao-no-risk-assessment/</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/hipaa-schlupflocher-lassen-gesundheitsdaten-wandern</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ids-vs-ips-o-que-as-organizacoes-precisam-saber-para-se-proteger</loc><lastmod>2022-08-31</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-os-csos-podem-aprender-do-vazamento-de-dados-do-yahoo</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/perspektive-wechseln-daten-daten-daten-vom-nebenprodukt-in-den-fokus</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/defekte-registry-eintrage</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.varonis.com/blog/in-process-status-for-fedramp-authorization</loc><lastmod>2025-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-soc</loc><lastmod>2022-01-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/nuvias-an-infinigate-group-company-ist-unser-distribution-partner-of-the-year</loc><lastmod>2023-09-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/getting-ready-for-salesforce-agentforce</loc><lastmod>2025-02-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-diferenca-entre-privacidade-de-dados-e-seguranca-de-dados/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/chatgpt-enterprise</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/cyber-versicherung</loc><lastmod>2022-12-08</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://www.varonis.com/blog/darkside-ransomware</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/it/blog/shadow-ai</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/blog/your-sales-data-is-mission-critical-are-you-protecting-it</loc><lastmod>2025-07-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-elements-de-registre-endommages</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dnsmessenger-le-cheval-de-troie-dacces-distant-rat-prefere-en-2017</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/solucao-da-varonis-fica-em-top-5-de-prevencao-de-perda-de-dados</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/platform/data-access-governance</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/iso-27001-compliance</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/roubo-de-dados-brasil-%C3%A9-o-pa%C3%ADs-mais-afetado</loc><lastmod>2022-03-12</lastmod></url><url><loc>https://www.varonis.com/blog/aws-gen-ai-and-secdataops-with-jonathan-rau</loc><lastmod>2024-07-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/ein-leitfaden-zu-kryptografischen-hashfunktionen-teil-2</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/storm-infostealer</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/ransomware-prevention</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/scattered-spider</loc><lastmod>2025-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/process-hacker</loc><lastmod>2022-11-21</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-spellman-saved-time-with-automated-data-security</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cybersecurity-tips</loc><lastmod>2024-12-10</lastmod></url><url><loc>https://www.varonis.com/blog/is-your-org-ready-for-microsoft-copilot</loc><lastmod>2024-08-30</lastmod></url><url><loc>https://www.varonis.com/fr/data-security-platform</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/supply-chain-risikomanagement</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/arbeiten-mit-lokalen-administratorkonten-unter-windows-teil-i</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ihr-habt-mich-aber-der-plan-geht-weiter</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/industry-recognition</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/blog/marsh-mclennan-agencys-cyber-resiliency-network</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/blog/mishandling-pii-gdpr</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/model-context-protocol-dns-rebind-attack</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-the-eu-general-data-protection-regulation</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/guia-de-compartilhamento-de-arquivos-do-microsoft-office-365/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-repondre-a-un-incident-de-cybersecurite</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/reality-winner-e-a-era-das-ameacas-internas</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-copilot-security-product</loc><lastmod>2025-03-13</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-pentesting-and-proactive-threat-hunting-with-tim-callahan</loc><lastmod>2024-08-26</lastmod></url><url><loc>https://www.varonis.com/blog/the-impact-of-ai-on-attack-vectors</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-06-21</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/eu-ai-act</loc><lastmod>2024-09-13</lastmod></url><url><loc>https://www.varonis.com/customer-stories/closing-security-gaps-with-varonis-remediation-automation</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-interceptor</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-get-started-with-powershell-and-active-directory-scripting</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/outlook-add-in-exfiltration</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenmigration-erfolgsratgeber</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/coverage/saas</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-upnp</loc><lastmod>2022-09-09</lastmod></url><url><loc>https://www.varonis.com/blog/rmm-tools</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://www.varonis.com/blog/disable-salesforce-public-links</loc><lastmod>2024-06-25</lastmod></url><url><loc>https://www.varonis.com/blog/phishing-attacks</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quase-50-das-empresas-tem-pelo-menos-1-000-dados-sensiveis-expostos</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/ja/blog/salesforce-user-impersonation</loc><lastmod>2025-09-08</lastmod></url><url><loc>https://www.varonis.com/blog/mongobleed-cve-2025-14847-memory-leak-vulnerability</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-a-diferenca-entre-governanca-de-ti-e-governanca-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-evaluer-votre-profil-de-risque-actuel-et-reduire-efficacement-vos-risques</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/local-file-inclusion-in-aws-remote-mcp-server</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/what-is-oauth</loc><lastmod>2022-03-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/group-policy-best-practices</loc><lastmod>2023-09-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/caca-de-ameacas-e-a-nova-tendencia-em-protecao-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/google-workspace-data-protection</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/bring-your-own-demise-infografik</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-ende-des-safe-harbor-abkommens</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-07-05</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/coverage/databases</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-5-choses-que-les-departements-informatiques-devraient-faire-et-quils-ne-font-pas</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/cutting-alert-noise-for-norfolk-southern-varonis</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-wird-blitzschnell-mit-solr</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/browsing-anonymously</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/forrester-wave-data-security-platforms</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-casse-tete-du-vol-de-propriete-intellectuelle-premiere-partie-habilitation-des-pirates-internes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/gdpr-effect-review</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/coverage/aws</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-for-salesforce-admins</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/de/coverage/aws</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/azure-app-mirage</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/adylkuzz-como-o-ransomware-wannacry-alertou-o-mundo-para-ameacas-piores</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/active-directory-diferenca-entre-o-windows-e-o-azure-ad/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/alles-uber-ransom32-raas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/coverage/databricks</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/it/solutions/ai-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-cdm-and-how-does-varonis-help</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/bidi-swap</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/numero-de-ataques-ddos-cresce-no-brasil</loc><lastmod>2022-04-28</lastmod></url><url><loc>https://www.varonis.com/blog/memory-forensics</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/ja/blog/cybertech-tokyo-2025</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-beste-passwortgenerator-sie-selbst</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/deaktivierung-von-windows-defender-durch-gruppenrichtlinie-behoben</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/best-practices-for-sharepoint-permissioning</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/coverage/google-cloud</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-de-securite-dns</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/google-workspace</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/kerberos-attack-silver-ticket</loc><lastmod>2022-07-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis.com/blog/data-lifecycle-automation</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/blog/echoleak</loc><lastmod>2025-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/scattered-spider</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/erstaunliche-fakten-zum-filesystem</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/blog/how-varonis-helps-with-email-security</loc><lastmod>2023-11-21</lastmod></url><url><loc>https://www.varonis.com/blog/giving-away-your-passwords</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/identifique-os-dados-mais-sensiveis-da-sua-empresa</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/docker-und-kubernetes-im-vergleich</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-%C3%A9-o-modelo-de-seguran%C3%A7a-confian%C3%A7a-zero</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/bei-der-datensicherheit-sind-sie-nur-so-stark-wie-ihr-schwachstes-glied</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-vs-data-resilience-tools</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/it/platform/athena-ai</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sete-dicas-para-tirar-proveito-dos-dados</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ransomware</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-rodar-uma-auditoria-do-ad-usando-varonis</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/gmsa</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quelle-est-la-difference-entre-cifs-et-smb</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-3-grosten-sicherheitsprobleme-von-sharepoint</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-x64dbg</loc><lastmod>2023-03-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/windows-berechtigungen-reparieren</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salesforce-site-exposure</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/it/platform/dspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-du-protocole-ipv6</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-use-cases</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/foret-active-directory</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/data-migration</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-for-pentesters</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ids-et-ips-en-quoi-sont-ils-differents</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/phishing-angriffen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/rogue-shortcuts-lnking-to-badness</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-07-12</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-guia-definitivo-contra-o-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-importancia-de-entender-o-comportamento-do-usuario-para-evitar-ataques/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/increased-threat-activity-targeting-ivanti-vulnerabilities</loc><lastmod>2024-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/pass-the-hash-angriffe-genauer-betrachtet-teil-3</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/platform/data-discovery-and-classification</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-buyers-guide</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-varonis-ajuda-voce-a-migrar-e-arquivar-dados-com-mais-seguranca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-classification-amazon-s3</loc><lastmod>2025-06-17</lastmod></url><url><loc>https://www.varonis.com/blog/cryptojacking</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/customer-stories/deploying-gen-ai-safely-with-eplus</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/meine-oma-benutzt-dropbox-warum-nicht-auch-ich</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/malware-freies-hacking-und-die-folgen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/platform/email-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/sysmon-threat-detection-guide</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://www.varonis.com/blog/exploiting-vpc-endpoints-for-s3buckets</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/schwachstellen-in-kerberos-pass-the-ticket-angriffe-eine-echte-bedrohung</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-user-impersonation</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-pci-compliance-anforderungen-und-sanktionen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-debuts-trailblazing-salesforce-security</loc><lastmod>2022-05-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/model-poisoning</loc><lastmod>2025-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-utiliser-le-journal-des-evenements-de-windows-pour-surveiller-les-activites-effectuees-sur-les-fichiers</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-shield</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.varonis.com/customer-stories/the-core-defense-for-superior-groups-data</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/scaling-accurate-classification</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/blog/endpoint-security</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-lanca-painel-personalizavel-de-gerenciamento-de-postura-de-seguranca-de-dados-dspm</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.varonis.com/it/blog/deepfakes-and-voice-clones</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/thank-you/webinar-2026</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-dashboard</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-train-europeen-des-projets-de-reformes-portant-sur-la-protection-des-donnees-prend-de-lelan</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/melhore-a-seguranca-e-minimize-riscos-para-o-negocio/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/football-player-laremy-tunsil-hacked-live-during-the-nfl-draft-agent-blames-silicon-valley</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/network</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-version-7-highlights</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-data-security-roadmap-for-cisos</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/coverage/azure-files</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/new-varonis-ebook-helps-it-kickstart-their-pen-testing-program</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ein-brute-force-angriff</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-the-hl-does-reasonable-data-security-really-mean</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/network-segmentation</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/data-classification-amazon-s3</loc><lastmod>2022-07-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/freigabeberechtigungen</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-8.6-control-collaboration-chaos-in-microsoft-365-varonis</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-protecting-private-healthcare-data-with-doug-cox</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/gartner-ai-powered-phishing</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/protecao-contra-malwares-como-defender-os-dados-corporativos-utilizando-a-solucao-varonis-datalert</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/qual-o-papel-da-inteligencia-artificial-ia-na-seguranca-cibernetica</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/blog/debunking-dspm-myths</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aws-remediation</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/neo4jection-segredos-dados-e-exploit-na-nuvem</loc><lastmod>2023-04-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/siem-tools</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/kubernetes-trends</loc><lastmod>2025-04-08</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-data-security</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://www.varonis.com/it/blog/top-cybersecurity-trends-for-2023</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-the-risk-management-framework</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utiliser-des-comptes-administrateur-local-windows-partie-i</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/risk-management-framework-rmf-vue-densemble</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-08-02</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/ai-data-security</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-vol-didentite-reste-la-premiere-plainte-des-consommateurs</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/the-malware-hiding-in-your-windows-system32-folder-more-rundll32-and-lol-security-defense-tips</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/conformite-a-la-reglementation-sur-la-securite-des-donnees-et-datadvantage-1ere-partie-des-rapports-essentiels-pour-evaluer-les-risques</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/reprompt</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/customer-stories/mitigating-data-exposure-and-risk-at-a-healthcare-organization</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-recht-auf-vergessenwerden-eine-erklarung</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/resources/support</loc><lastmod>2026-02-07</lastmod></url><url><loc>https://www.varonis.com/it/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/finden-personenbezogener-eu-personendaten-mit-regularen-ausdrucken-regex</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-for-salesforce-admins</loc><lastmod>2023-04-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gartner-ai-powered-phishing</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-masking</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/zwischenzeitlich-in-der-eu-showdown-beim-datenschutz-in-bezug-auf-cookies-und-opt-in</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rapport-risques-sur-les-donnees-varonis-2018</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/deloitte-report-on-insider-threats</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/blog/fsmo-roles</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/solutions/ransomware-prevention</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-opens-new-australian-data-centre</loc><lastmod>2023-05-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-erros-que-tornam-os-dados-corporativos-uma-ameaca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/es/blog/deepfakes-and-voice-clones</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-blob-storage</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/working-in-cybersecurity</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://www.varonis.com/blog/cmmc-final-rule</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-cios-von-snapchat-lernen-konnen-die-top-3</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/detecting-malware-payloads-in-office-document-metadata</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-mimikatz</loc><lastmod>2025-05-02</lastmod></url><url><loc>https://www.varonis.com/it/blog/cybersecurity-trends</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-webui-with-solr</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/process-hacker</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/google-cloud</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/ceo-phishing-die-wertvollsten-unternehmensdaten-im-visier</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/manufacturing-data-risk-report-reveals-files-open-to-all-employees</loc><lastmod>2023-01-19</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-september-2025</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-monitor-network-traffic</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-june-2023</loc><lastmod>2023-08-03</lastmod></url><url><loc>https://www.varonis.com/blog/hive-ransomware-analysis</loc><lastmod>2023-02-15</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-identity-protection</loc><lastmod>2025-06-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/eu-ai-act</loc><lastmod>2024-09-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-05-10</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/why-do-sharepoint-permissions-cause-so-much-trouble</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/ja/blog/rethinking-database-security</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/configure-varonis-emc-isilon</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/url-spoofing</loc><lastmod>2024-02-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/modelisation-menaces</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-statistics</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-laps</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-modelagem-de-ameacas-e-como-escolher-a-estrutura-certa</loc><lastmod>2023-12-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/missbrauch-von-falsch-konfigurierten-salesforce-communitys</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/stack-memory-3</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/phishing-attacks-classified-big-phish-vs-little-phishes</loc><lastmod>2022-05-19</lastmod></url><url><loc>https://www.varonis.com/blog/the-world-in-data-breaches</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/es/blog/deepseek</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/blog/respond-cyber-security-incident</loc><lastmod>2022-12-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cybersecurity-trends</loc><lastmod>2024-02-22</lastmod></url><url><loc>https://www.varonis.com/it/blog/data-security</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-dspm</loc><lastmod>2025-05-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-o-que-fazer-apos-um-ataque-de-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/platform/database-activity-monitoring</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/direito-de-ser-esquecido-explicado</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/einfuhrung-in-oauth-ohne-fachchinesisch</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/mitre-attck</loc><lastmod>2022-03-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/getting-ready-for-salesforce-agentforce</loc><lastmod>2025-02-17</lastmod></url><url><loc>https://www.varonis.com/blog/going-back-sql-server-2008-order-move-ahead</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/es/blog/los-primeros-90-d%C3%ADas-de-un-ciso</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-version-7-0</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/5-praticas-que-colocam-a-seguranca-da-sua-empresa-em-risco</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/ja/blog/prevent-pii-exposure</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/blog/4-secrets-for-archiving-stale-data-efficiently</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/giving</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/powershell-active-directory-module</loc><lastmod>2023-02-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tudo-o-que-voce-precisa-saber-para-se-prevenir-dos-ransomwares</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-neue-sicherheitskonzept-von-windows-10-teil-1-authentifizierung</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/polyrize</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-leaders-shine-as-crns-women-of-the-channel</loc><lastmod>2024-05-17</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-pima-community-college-secures-student-data</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utiliser-des-comptes-administrateur-local-windows-partie-iii</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/evite-o-roubo-de-senhas-que-pode-ser-realizado-pelos-ataques-meltdown-e-spectre</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/presentation-de-notre-nouvelle-api-dataprivilege-et-apercu-de-nos-patterns-gdpr</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/data-centers-india</loc><lastmod>2025-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-kerberos-lutter-golden-ticket</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/solarwinds-sunburst-backdoor-inside-the-stealthy-apt-campaign</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-military-information-security-with-mike-taylor</loc><lastmod>2024-09-12</lastmod></url><url><loc>https://www.varonis.com/blog/crowdstrike-blue-screen-recovery-steps</loc><lastmod>2024-07-19</lastmod></url><url><loc>https://www.varonis.com/blog/why-law-firms-should-care-about-data-security</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/it/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-finde-ich-heraus-zu-welchen-active-directory-gruppen-ich-gehore</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/slashnext/terms-of-service</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estrutura-mitre-attck-tudo-o-que-voce-precisa-saber</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/forrester-wave-data-security-platforms</loc><lastmod>2023-03-31</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-network-watcher</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/es/blog/77-cybersecurity-statistics-and-trends-for-2023</loc><lastmod>2024-07-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-descobre-novo-malware-minerador</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/github-secrets-discovery</loc><lastmod>2023-02-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quantidade-de-dados-desprotegidos-e-astronomica/</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dspm-use-cases</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-feb-2024</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rippling-vs-deel</loc><lastmod>2025-03-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/x64dbg-depacker-malware</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/advanced-phishing-tactics</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ein-active-directory-forest</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/sicherheitstipps-pos-basierte-angriffe-im-einzelhandel-verhindern</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/wer-den-schaden-hat</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-strategy</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/it/platform/data-centric-ueba</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/fisma-compliance</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/es/solutions/compliance-management</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/pgp-encryption</loc><lastmod>2023-03-09</lastmod></url><url><loc>https://www.varonis.com/blog/aws-vs-azure-vs-google</loc><lastmod>2025-01-15</lastmod></url><url><loc>https://www.varonis.com/blog/ipv6-security</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-joins-salesforce-appexchange</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/detecting-agentic-ai-threats</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-ddos-attack</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/why-every-cybersecurity-leader-should-assume-breach</loc><lastmod>2022-07-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-teil-3-was-tun-wenn-es-bereits-passiert-ist</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/ai-data-security</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/es/solutions/data-lifecycle-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/it/data-security-platform</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-site-exposure</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-may-2024</loc><lastmod>2024-05-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-mitigar-ataques-golden-ticket-com-pac-privileged-attribute-certificate</loc><lastmod>2022-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/from-the-hipaa-case-files-jail-time-fines-and-access-rights</loc><lastmod>2023-03-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-du-cycle-de-vie-des-donnees-identifier-ou-vos-donnees-sont-vulnerables</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/behind-the-varonis-rebrand</loc><lastmod>2024-02-12</lastmod></url><url><loc>https://www.varonis.com/blog/lessons-learned-from-mat-honans-epic-hacking</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-compliance-and-datadvantage-part-i-essential-reports-for-risk-assessment</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/incursion-dans-le-piratage-sans-malware-partie-iii</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/apt-ce-quil-faut-savoir-sur-les-menaces-persistantes-avancees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-cloud-governance</loc><lastmod>2025-02-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/obfuscation-du-powershell-sinfiltrer-en-profitant-de-la-confusion-partie-i</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/es/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-11-05</lastmod></url><url><loc>https://www.varonis.com/blog/sec-cybersecurity-disclosure-requirements</loc><lastmod>2023-12-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-ein-leitfaden-in-vier-teilen-teil-1-ransomware-zahlen-oder-nicht-zahlen-und-was-bitcoins-damit-zu-tun-haben</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/integridade-de-dados-o-que-e-e-como-voce-pode-mante-la</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/automating-permissions-cleanup</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/model-poisoning</loc><lastmod>2025-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-resposta-a-incidentes/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/coverage/active-directory</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/es/platform/browser-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/nichts-tun-irgendetwas-tun-das-richtige-tun</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-expandierende-daten-universum</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/protection-des-donnees-de-cloud-dans-lue-sortir-de-la-servitude</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-commoditization-of-cybercrime-with-matt-radolec</loc><lastmod>2024-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cours-de-phishing-voulez-vous-hameconner-votre-systeme-de-fichiers</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/databricks</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://www.varonis.com/de/coverage/iaas</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/difference-entre-active-directory-et-ldap</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/bancos-sofrem-secretamente-com-ataques-de-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/pgp-encryption</loc><lastmod>2023-02-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/tipps-zur-datenklassifizierung-so-spuren-sie-kreditkartennummern-auf</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/rootkit</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/compare-salesforce-user-permissions-with-ease</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-ransomware-parte-1</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/10-menschen-aus-der-infosec-denen-sie-unbedingt-auf-twitter-folgen-sollten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/spickzettel-fur-die-konfiguration-von-sharepoint-berechtigungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/what-is-saml</loc><lastmod>2022-03-04</lastmod></url><url><loc>https://www.varonis.com/blog/ryuk-ransomware</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/protection-donnees-google-workspace</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/tls-et-ssl</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/huit-qualites-a-rechercher-dans-un-logiciel-daudit-de-fichiers</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/integrite-des-donnees-quest-ce-que-cest-comment-la-preserver</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/active-directory-domain-services-ad-ds</loc><lastmod>2022-05-05</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-dspm</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.varonis.com/blog/chatgpt-enterprise-connectors</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://www.varonis.com/fr/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/four-must-know-cyber-tips-for-your-business</loc><lastmod>2023-01-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ponemon-et-netdiligence-nous-rappellent-que-le-cout-des-piratages-de-donnees-peut-etre-colossal</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/eine-kurze-geschichte-der-ransomware</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nmap-commands</loc><lastmod>2022-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ne-comptez-pas-sur-des-murs-de-donnees-plus-eleves-pour-tenir-les-menaces-avancees-persistantes-a-distance</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-data-security-plataform-pode-entregar-um-roi-de-346</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/abusing-salesforce-communities</loc><lastmod>2025-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-compliance-and-datadvantage-part-ii-more-on-risk-assessment</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/industry/federal-government</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-avaliar-seus-fornecedores</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/ponemon-und-netdiligence-eine-erinnerung-die-enormen-kosten-von-datenschutzverletzungen</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cloud-security-programs</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/du-cloud-et-de-sa-dissipation</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/compliance-brief-iso-27001-und-27002-normen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/5-choses-a-savoir-sur-les-big-data</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/blog/kerberos-loopholes-pass-ticket</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/netcat-commands</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/ja/blog/mind-games</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-decouvrir-les-donnees-soumises-au-gdpr-avec-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-classification-amazon-s3</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/broken-registry-items</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-developing-security-as-a-service-with-alexis-bonnell</loc><lastmod>2024-05-14</lastmod></url><url><loc>https://www.varonis.com/coverage/google-workspace</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-partnership</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-as-pmes-estao-mais-suscetiveis-aos-hackers</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-june-2024</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-responder-a-um-incidente-de-seguranca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/cyber-insurance-recovery-with-scott-godes</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/es/coverage/mongodb</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/varonis-threat-labs</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/controle-de-acesso-a-rede-saiba-tudo-sobre-essas-solucoes-e-sua-importancia</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/ja/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/mitre-attck-framework-complete-guide</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/blog/cybercrime-subscription-business</loc><lastmod>2025-11-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/salt-typhoon</loc><lastmod>2025-03-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-cifs-und-smb</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/weshalb-ein-honigtopf-keine-umfassende-sicherheitslosung-ist</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/security-risk-analysis-is-different-from-risk-assessments</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/secure-snowflake-data</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dark-data-des-entreprises-un-atout-cache</loc><lastmod>2022-11-29</lastmod></url><url><loc>https://www.varonis.com/it/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-gartner-peer-insights</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-harbin-clinics-security-team-remediates-data-exposure</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-falta-de-etica-pode-colocar-a-seguranca-em-risco</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/8-eventos-que-mudaram-a-seguranca-de-dados-para-sempre/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/mongodb-data-classification</loc><lastmod>2024-11-19</lastmod></url><url><loc>https://www.varonis.com/blog/commanding-officers-guide-to-data-security</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/cloud-security-programs</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-varonis-melhora-a-sua-resposta-a-um-incidente</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/7-bonnes-pratiques-a-suivre-pour-votre-migration-vers-le-cloud</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-monitor-network-traffic</loc><lastmod>2025-04-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/aws-remediation</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/artificial-intelligence-security</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-datalert-und-ibm-qradar</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/difference-e3-e5-office-365</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-e3-und-e5-office-365-funktionen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/llm-security-risks</loc><lastmod>2024-09-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/big-data-management-auf-nas-systemen-leicht-gemacht</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/customer-stories/safely-deploying-copilot-with-the-power-of-varonis-and-mddr</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/controle-de-acesso-a-melhor-defesa-contra-o-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/4-tipps-fur-eine-sinnvolle-archivierung-veralteter-daten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-data-security-nasuni</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/using-malicious-azure-apps-to-infiltrate-a-microsoft-365-tenant</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/fique-atento-aos-novos-ataques-usando-o-malware-mirai</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/es/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes</loc><lastmod>2024-07-08</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-version-7-4</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2024-02-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-neuigkeiten-17-05</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-august-2023</loc><lastmod>2023-08-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/malicious-firewall-rules-in-azure-sql</loc><lastmod>2025-04-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/interner-datenverlust-riskanter-als-gedacht</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/m365-bec-attack</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://www.varonis.com/customer-stories/a-banks-journey-with-varonis</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/pos-cyber-attacken-malware-ist-nicht-wofur-sie-sie-halten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/remote-work-update</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/atualize-suas-praticas-de-seguranca-cibernetica-e-abrace-a-resiliencia</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/data-classification-buyers-guide</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-nouvel-environnement-de-la-confidentialite-lunion-europeenne-en-pointe-sur-la-protection-des-donnees-personnelles</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/platform/identity-posture</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis.com/blog/data-lifecycle-automation</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-9-grupos-de-ameacas-persistentes-avancadas-e-seus-principais-ataques</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ibm-qradar-et-varonis-datalert</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-security-vs-data-resilience-tools</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/blog/aws-iam</loc><lastmod>2024-02-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gouvernance-des-donnees-dans-le-secteur-de-la-sante-guide-complet</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/secure-snowflake-data</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/alertes-et-supervision-en-temps-reel-avec-varonis-datalert</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/machen-sie-backoff-co-einen-strich-durch-die-rechnung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-difference-entre-tout-le-monde-et-utilisateurs-authentifies</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/protecao-contra-malware-conceitos-basicos-e-melhores-praticas/</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/copilot-in-healthcare</loc><lastmod>2024-10-17</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-forest</loc><lastmod>2022-03-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/10-specialistes-de-la-securite-de-linformation-a-suivre-sur-twitter</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-le-cc</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/empresas-ainda-falham-ao-reduzir-privilegios-de-acesso-para-usuarios</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-vs-cmd</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-evitar-ameacas-ciberneticas</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-aprendemos-conversando-com-profissionais-de-seguranca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-in-aws-s3</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-unitedrake-da-nsa</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/netcat-commands</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/zero-trust-confie-nos-seus-funcionarios</loc><lastmod>2022-05-17</lastmod></url><url><loc>https://www.varonis.com/blog/living-of-the-land-lol-with-microsoft-tools-part-i-intro-to-regsvr</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/it/coverage/network</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/pgp-encryption</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/the-logging-dead-two-windows-event-log-vulnerabilities</loc><lastmod>2023-01-17</lastmod></url><url><loc>https://www.varonis.com/blog/openssh-regresshion-rce-vulnerability</loc><lastmod>2024-07-02</lastmod></url><url><loc>https://www.varonis.com/de/coverage/databases</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/wmi-windows-management-instrumentation</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/fr/blog/5-choses-que-les-experts-en-confidentialite-veulent-que-vous-sachiez-a-propos-des-wearable-technologies</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/strategisches-account-management-team</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dados-na-nuvem-e-on-premise-obtenha-o-melhor-dos-dois-mundos</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/5-facons-de-proteger-active-directory-avec-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/platform/database-activity-monitoring</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/es/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-variablenbereich</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/teams-nouvelles-07-12</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-cryptowall-em-2018/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/visualize-seus-riscos-com-o-novo-painel-datalert</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/solutions/ai-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-funciona-um-ataque-de-forca-bruta</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/uba-definir-les-ecarts-de-comportement-grace-a-lanalyse-du-comportement-des-utilisateurs</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-wyndham-outsmarts-hackers-with-varonis-mddr</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-use-cases</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ccsp-vs-cissp</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/de/coverage/servicenow</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/deepfakes-and-voice-clones</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-vs-cspm-solutions</loc><lastmod>2023-12-05</lastmod></url><url><loc>https://www.varonis.com/es/coverage/microsoft-365-copilot</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/differences-between-the-gdpr-and-privacy-directive</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/ids-vs-ips-was-ist-der-unterschied</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/votre-entreprise-est-elle-prete-faire-face-aux-cyber-attaques</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/april-2021-malware-trends-report</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/best-sources-of-business-data-in-2019</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/it/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/active-directory</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-dangers-des-liens-partages</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/cve-postgresql-pl/perl</loc><lastmod>2024-11-15</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/insider-risk-management</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-public-link-remediation</loc><lastmod>2024-02-06</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-acquires-alltrue-ai-security</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-auxiliar-seu-time-a-preservar-o-compliance-em-ciberseguranca</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/welche-auswirkungen-hat-die-digitale-transformation-auf-traditionelle-cybersecurity-ansatze</loc><lastmod>2022-08-22</lastmod></url><url><loc>https://www.varonis.com/blog/jira-permissions</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/it/blog/three-ways-varonis-helps-fight-insider-threats</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-funf-gefahrlichsten-software-fehler</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/de-onde-vem-as-vulnerabilidades-de-seguranca-2</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/es/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-difference-entre-iam-et-lca</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estrutura-de-gerenciamento-de-risco-rmf-uma-visao-geral-1</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-ponemon-privacy-und-security-of-healthcare-data-report-5-erschreckende-resultate</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/56-estatisticas-de-violacao-de-dados-para-2019</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dns-kezako</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-site-exposure</loc><lastmod>2024-09-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/wenn-auch-nicht-unser-leben-wenigstens-unsere-daten-konnen-wir-uberprufen</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/coverage/microsoft-365-copilot</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-possui-a-solucao-que-extrai-o-maximo-das-ferramentas-de-gerenciamento-e-correlacao-de-eventos-de-seguranca-siem</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-dataprivilege-and-rsa-identity-governance-and-lifecycle</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-neue-datenschutzumgebung-europaische-union-weist-den-weg-fur-personenbezogenen-datenschutz</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/securing-access-azure-webapps</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-um-whaling-attack</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-botnet</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/56-statistiken-uber-datenschutzverletzungen-die-sie-fur-das-jahr-2020-kennen-mussen</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/ja/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/solutions/insider-risk-management</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/blog/jitter-trap</loc><lastmod>2025-06-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aws</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/sieben-empfehlungen-zum-datenschutz-von-andras-cser-forrester</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-soc</loc><lastmod>2023-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/max-roi-least-privilege-model</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-june-2025</loc><lastmod>2025-06-26</lastmod></url><url><loc>https://www.varonis.com/blog/servicenow</loc><lastmod>2024-12-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/3-conseils-pour-surveiller-et-securiser-exchange-online</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/deepseek</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/menaces-de-cybersecurite</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/deepseek</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-the-legal-cheat-sheet-for-breach-notification</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/candidate-privacy-policy</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenschutz-compliance-und-datadvantage-teil-i-wichtige-berichte-fur-die-risikobewertung</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/kubernetes-trends</loc><lastmod>2025-04-08</lastmod></url><url><loc>https://www.varonis.com/de/platform/data-centric-ueba</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/behind-the-varonis-rebrand</loc><lastmod>2024-05-22</lastmod></url><url><loc>https://www.varonis.com/blog/azure-skeleton-key</loc><lastmod>2025-01-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cybersecurity-statistics</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conformidade-com-o-iso-27001-dicas-e-insights-essenciais</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/es/blog/shadow-ai</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/es/blog/chatgpt-enterprise</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-einstein-wormhole</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/shadow-it-riscos-de-seguranca-da-informacao-ocultos</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/cerber-ransomware-was-sie-wissen-mussen</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sites-fantasmas-roubo-de-dados-de-comunidades-salesforce-desativadas</loc><lastmod>2023-06-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/debunking-dspm-myths</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-introduces-athena-ai</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/letat-de-la-protection-des-donnees-infographie</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/understanding-and-applying-the-shared-responsibility-model</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-varonis-helps-with-email-security</loc><lastmod>2024-02-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/llm-security-risks</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://www.varonis.com/industry/state-local-and-education</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/proactive-incident-response</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/mobile-applikationen-mit-schwerwiegenden-schwachstellen-in-den-anmeldeinformationen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/podemos-considerar-o-ransomware-uma-violacao-de-dados/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-introduces-athena-ai</loc><lastmod>2024-03-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/actualites-azure-05-07</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-5-raisons-principales-pour-lesquelles-les-entreprises-veulent-une-alternative-a-dropbox</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-la-conformite-sox</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/de/coverage/active-directory</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/phishing-betrug-mit-google-drive</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vazamento-de-dados-no-comercio-eletronico-solucao-varonis-datalert-e-ideal-para-evitar-esse-tipo-de-problema</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-entreprises-ne-sont-pas-encore-pretes-pour-la-nouvelle-reglementation-europeenne-sur-la-protection-des-donnees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/why-did-last-fridays-global-ransomware-infection-spread-so-fast</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/ist-big-data-die-geheimwaffe-der-it-in-sachen-informationssicherheit</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/lektionen-aus-dem-malware-museum</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-adds-file-analysis-to-cloud-data-classification-capabilities</loc><lastmod>2022-12-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/geschaftsmodell-rats-alienspy-und-taas-trojans-as-a-service</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/disable-salesforce-public-links</loc><lastmod>2024-07-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/ist-ihr-unternehmen-auf-einen-cyberangriff-vorbereitet</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-des-donnees-salesforce-shield</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-uma-avaliacao-de-risco-de-dados-e-por-que-voce-deve-fazer</loc><lastmod>2024-01-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dspm-x-cspm-unindo-dados-e-seguranca-na-nuvem-com-a-varonis</loc><lastmod>2024-01-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-os-hackers-estao-tirando-proveito-da-pandemia-de-coronavirus</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/zwischenzeitlich-in-der-eu-google-auf-kollisionskurs-mit-dem-grundrecht-auf-schutz-der-privatsphare</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/understanding-and-applying-the-shared-responsibility-model</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/blog/ransomhub</loc><lastmod>2025-07-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-difference-entre-gouvernance-des-donnees-et-gouvernance-des-systemes-dinformation</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/diebstahl-geistigen-eigentums-teil-2-verzeichniskopien-finden</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-gdpr-mais-sous-un-autre-nom-la-nouvelle-loi-britannique-de-protection-des-donnees</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/professionnels-de-la-cybersecurite-et-cadres-dirigeants-sentendent-ils-sur-les-cybermenaces-prioritaires</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-enhances-cloud-security-alerts-with-mitre-attck-tactics</loc><lastmod>2022-10-18</lastmod></url><url><loc>https://www.varonis.com/blog/deep-dive-into-ropc</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/microsoft-365-copilot</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/threat-detection-with-agentic-ai</loc><lastmod>2025-05-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/8-qualites-a-rechercher-dans-un-logiciel-audit-de-fichiers</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/coverage/box</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-par-deni-de-service-distribue-ddos</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/aws-devops</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/whaling-une-attaque-par-spear-phishing-particuliere</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/configuration-drift</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-est-desormais-integre-avec-les-systemes-de-stockage-ibm-storwize-v7000</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securiser-vos-fichiers-protegez-vos-donnees-avec-des-astuces-tres-simples</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/offentliche-versus-private-cloud-die-fur-wider</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-verschleierung-unerkannt-durch-verwirrung-teil-i</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-dec-2023</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-idor-insecure-direct-object-reference</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/compliance-zauberformel-oder-burde-und-was-hipaa-damit-zu-tun-hat</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-a-solucao-varonis-edge-que-esta-em-versao-beta-no-brasil</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-o-uba-protege-sua-empresa-dos-ataques-de-ransomware</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/azure-network-watcher</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/itar-compliance</loc><lastmod>2023-03-03</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-year-in-review-2021</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/de/coverage/windows-file-shares-and-nas</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/aws-remediation</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-blob-storage</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/deepseek</loc><lastmod>2025-02-05</lastmod></url><url><loc>https://www.varonis.com/es/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/it/blog/forrester-wave-data-security-platforms</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/the-logging-dead-two-windows-event-log-vulnerabilities</loc><lastmod>2023-01-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rethinking-database-security</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-11-01</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-custo-de-uma-invasao-ao-big-data-parte-ii</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/drittanbieter-risikomanagement</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/vom-chaos-zur-ordnung-oder-was-kinderzimmer-aufraumen-mit-berechtigungsmanagement-zu-tun-hat</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-voce-esta-se-preparando-para-a-lgpd</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenintegritat-was-ist-das-und-wie-ist-sie-aufrecht-zu-erhalten</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/enterprise-search-ein-big-data-problem-fur-den-big-boss</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-6-die-pass-the-hash-methode</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomhub</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-datenschutzverstos-in-ubuntu-foren-schwache-passworter-und-die-folgen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/compliance-data-security</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://www.varonis.com/ciso-resource-center</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/the-benefits-of-threat-and-data-breach-reports</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-user-behavior-analytics</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/dcom-distributed-component-object-model</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-to-acquire-cyral-database-activity-monitoring</loc><lastmod>2025-03-17</lastmod></url><url><loc>https://www.varonis.com/blog/github-secrets-discovery</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/customer-stories/cheney-brothers-uses-varonis-to-fill-security-gaps</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/evil-twin-attack</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/salesforce-user-impersonation</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://www.varonis.com/blog/permission-propagation</loc><lastmod>2023-11-08</lastmod></url><url><loc>https://www.varonis.com/de/blog/deepfakes-and-voice-clones</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/blog/hipaa-compliance</loc><lastmod>2025-02-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/nmap-commands</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/expertentipps-wie-sie-die-gruppenstruktur-fur-4-500-benutzer-optimieren</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-dsgvo-compliance</loc><lastmod>2022-01-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/databricks</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/integracao-do-portfolio-da-varonis-ao-iam-permite-melhor-governanca-de-acesso</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/privacy-design-cheat-sheet</loc><lastmod>2022-09-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-o-uba-vai-combater-a-proxima-geracao-de-ransomwares</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-buyers-guide</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/wikileaks-e-ramsonware-precursores-da-extorsao-em-massa</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rbac-kesako</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/why-were-going-all-in-on-saas</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/servicenow</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/four-must-know-cyber-tips-for-your-business</loc><lastmod>2022-12-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-uma-plataforma-de-seguranca-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/data-leaks</loc><lastmod>2024-10-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-classification-labels-integration-a-la-solution-de-protection-des-informations-de-microsoftmip</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/coverage/iaas</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/amazon-redshift</loc><lastmod>2024-07-05</lastmod></url><url><loc>https://www.varonis.com/es/solutions/sspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utilisation-abusive-de-communautes-salesforce</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/is-dna-really-personally-identifiable-information-pii-no-maybe-yes</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/principais-tendencias-de-ciberseguranca-para-2023</loc><lastmod>2023-05-04</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/databricks</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-azure-devops</loc><lastmod>2022-08-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/ups-wir-haben-ein-paar-terabytes-verloren-nbd</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-ressourcenzentrum</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/consumidores-ja-nao-confiam-na-capacidade-das-empresas-de-proteger-seus-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/solutions/cloud-data-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-o-ransomware-wannacry-se-espalhou-tao-rapidamente</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-data-risk-assessment</loc><lastmod>2024-06-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/bewahrte-methoden-fur-die-auswahl-von-active-directory-domannamen</loc><lastmod>2023-04-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/least-privilege-automation</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/snowflake-investigation</loc><lastmod>2024-06-18</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-march-2024</loc><lastmod>2024-04-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-automation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-os-riscos-das-olimpiadas-a-seguranca-da-informacao</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dcom-technologie-distributed-component-object-model</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-wenn-die-cloud-verschwindet</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/platform/email-data-protection</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-anatomia-de-um-e-mail-de-phishing</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-in-the-cloud</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/it/solutions/sspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/automated-dspm</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/blog/okta-attack-vectors</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/cryptolocker-lockouts-and-mass-deletes-oh-my</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/blackcat-ransomware</loc><lastmod>2023-04-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/aws-vs-azure-vs-google</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/blog/data-discovery-is-not-data-security</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/ruckgangigmachen-eines-commit-in-git</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/tips-pros-best-practices-managing-large-amounts-shared-data</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/applications-azure-malveillantes-pour-infiltrer-un-tenant-microsoft-365</loc><lastmod>2023-09-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/solucao-datadvantage-da-varonis-facilita-a-implementacao-do-controle-de-acesso-baseado-em-funcao-rbac-como-medida-de-seguranca-de-dados</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/data-breach-literacy-survey</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/controleur-de-domaine</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/likelihood-of-a-cyber-attack</loc><lastmod>2022-02-22</lastmod></url><url><loc>https://www.varonis.com/blog/data-centric-security-for-the-dod</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/blog/fishxproxy-phishing-kit</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/descubra-se-seus-dados-estao-prontos-para-uma-solucao-de-gestao-de-identidade-e-acesso</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conferencia-rsa-empresas-continuam-focadas-em-solucoes-individuais</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/direct-send-exploit</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://www.varonis.com/blog/applying-zero-trust-to-mcp-in-ai-systems</loc><lastmod>2026-03-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-proteger-o-google-drive-guia-de-protecao-de-dados</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/the-mirai-botnet-attack-and-revenge-of-the-internet-of-things</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/gdpr-requirements-list-in-plain-english</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/three-ways-varonis-helps-fight-insider-threats</loc><lastmod>2023-09-02</lastmod></url><url><loc>https://www.varonis.com/blog/fileless-malware</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/blog/manipulating-salesforce-public-links</loc><lastmod>2024-09-16</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-iron-clad-security-with-aaron-ansari</loc><lastmod>2025-01-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-year-in-review-2021</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-fur-fahigkeiten-der-datenklassifizierung-forrester-report-aufgenommen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/rusty-pearl</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-sspm</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/the-logging-dead-two-windows-event-log-vulnerabilities</loc><lastmod>2024-08-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/identity-blind-spot</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-delivers-market-leading-salesforce-security-varonis</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ciso-security-plan</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/wenn-datenschutz-zur-kostenfalle-wird</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/federal-data-breaches</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/presentation-de-oauth-garantie-sans-jargon-technique</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-merge-in-git</loc><lastmod>2023-04-06</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-identity-protection</loc><lastmod>2025-06-10</lastmod></url><url><loc>https://www.varonis.com/blog/shared-responsibility-model</loc><lastmod>2024-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-siwar-el-assad</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/working-with-windows-local-administrator-accounts-part-i</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-march-2025</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-vulnerabilite-zero-day-expliquee</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/blog/azure-virtual-network</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/portscanning-techniken</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/azure</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-ransomware-parte-2/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/data-lifecycle-management</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-version-7-0</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/blog/data-securitys-tower-of-jenga</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/itar-compliance</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/grenzuberschreitende-datensicherheit-eine-bedrohung-fur-das-internet</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/data-breach-response-times</loc><lastmod>2022-06-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-la-reponse-aux-incidents-un-plan-en-6-etapes</loc><lastmod>2024-01-26</lastmod></url><url><loc>https://www.varonis.com/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/de/platform/email-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-21-12</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/platform/identity-threat-detection-and-response</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-visibilite-est-une-condition-prealable-de-la-securite</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/de/data-security-platform</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-office-365-file-sharing</loc><lastmod>2022-02-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/cybersicherheitsbedrohungen</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-network-watcher</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/the-identity-crisis-research-report</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/dspm-vs-cspm-solutions</loc><lastmod>2023-11-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/unerwartet-sturmisch-non-compliance-und-wirtschaftskriminalitat-nach-nsa</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-bedrohungen-teil-2-motivation</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/netcat-commands</loc><lastmod>2022-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/une-faille-de-securite-vient-toujours-de-votre-maillon-le-plus-faible</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-tool-roundup</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/infrastructure-as-code</loc><lastmod>2025-05-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/so-reparieren-sie-zugriffsrechte-ohne-einen-tumult-auszulosen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-governance</loc><lastmod>2022-07-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/boas-praticas-para-proteger-a-imagem-da-sua-empresa</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-classification-deep-dive</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://www.varonis.com/blog/managed-data-detection-and-response</loc><lastmod>2024-03-05</lastmod></url><url><loc>https://www.varonis.com/it/solutions/policy-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/statistiques-fuites-de-donnees</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/es/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/ja/blog/varonis-acquires-alltrue-ai-security</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://www.varonis.com/platform/dlp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/neues-sicherheits-dashboard-verbesserte-verhaltensanalyse-und-einiges-mehr</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/itar-compliance</loc><lastmod>2025-04-11</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-october-2025</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/guia-de-migracao-de-dados-estrategia-de-sucesso-e-praticas-recomendadas</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-sie-dsgvo-daten-mit-varonis-entdecken</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/smarter-hacker-contest</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/do-your-gdpr-homework-and-lower-your-chances-of-fines</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-leads-dspm-market-on-gartner-peer-insights</loc><lastmod>2023-11-16</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-data-center-in-canada</loc><lastmod>2023-10-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/analise-de-risco-de-seguranca-e-diferente-de-avaliacao-de-risco/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/announcing-varonis-edge-to-the-perimeter-and-beyond</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-monitor</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-prever-desvios-de-comportamento-com-o-uba-2</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/windows-powershell-tutorials</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-has-a-privacy-problem</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/sspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-security-programs</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/ihre-daten-als-spiegel</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/es/coverage/chatgpt-enterprise</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-andere-sicherheitsaspekt-der-nsa-affare-zwei-faktor-authentifizierung</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/fuites-de-donnees-les-menaces-viennent-de-linterieur</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-delivers-market-leading-salesforce-security-varonis</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-and-kubernetes</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/red-teaming</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/protection-contre-les-programmes-malveillants-defendre-les-donnees-grace-a-lanalyse-de-la-securite-de-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/top-cybersecurity-trends-for-2023</loc><lastmod>2023-09-14</lastmod></url><url><loc>https://www.varonis.com/blog/texas-privacy-act</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/es/blog/salesforce-site-exposure</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/setor-industrial-1-em-cada-5-arquivos-esta-disponivel-a-todos-os-funcionarios</loc><lastmod>2022-03-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/active-directory-users-and-computers</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/funf-schritte-zur-entscharfung-des-grosten-datensicherheitsrisikos</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-identity-protection</loc><lastmod>2025-06-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/red-teaming</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/platform/browser-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/careers</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/blog/update-62-saas-authentication-monitoring-evasion</loc><lastmod>2022-01-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-a-automacao-significa-para-a-seguranca-cibernetica-3-dicas-para-seu-negocio</loc><lastmod>2023-06-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/docker-vs-kubernetes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/solutions/data-risk-assessment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/rage-against-the-machine-data</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/hospitais-sao-o-novo-alvo-do-ransomware/</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/es/blog/webhook-integration</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/scaling-accurate-classification</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/netcat-commands</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/boll-wird-neuer-distributor</loc><lastmod>2023-05-25</lastmod></url><url><loc>https://www.varonis.com/terms-of-use</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-eine-datenschutzplattform</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-prevent-ransomware</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-gehen-sie-damit-um-wenn-uber-100-000-nutzer-250-millionen-ordner-teilen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/investigate-ntlm-brute-force</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/blog/domain-controller</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/investigate-ntlm-brute-force</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-expands-azure-and-aws-dspm-support</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/blackmatter-ransomware</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/privacy-policy</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/classification-des-donnees-kesako</loc><lastmod>2022-11-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/top-ai-security-questions</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://www.varonis.com/it/blog/salesforce-shield</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.varonis.com/es/coverage/windows-file-shares-and-nas</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/a-practical-software-approach-to-insider-threats</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/pourquoi-un-honeypot-nest-pas-une-solution-de-securite-complete</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-shadow-brokers-continuent-dexploiter-le-filon-de-la-nsa-et-publient-unitedrake</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/automated-posture-management</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-neue-sicherheitskonzept-in-windows-10-teil-2-mehr-zum-thema-authentifizierung</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/crescimento-no-uso-de-identidades-digitais-expoe-empresas-a-riscos-de-seguranca</loc><lastmod>2022-07-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/edr-sicherheit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/create-s3-bucket</loc><lastmod>2025-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/why-every-cybersecurity-leader-should-assume-breach</loc><lastmod>2022-07-11</lastmod></url><url><loc>https://www.varonis.com/es/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-07-12</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/trust/security</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/abweichende-verhaltensweisen-mit-analysen-des-nutzerverhaltens-definieren</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ihr-dateisystem-audit-beansprucht-zu-viel-speicherplatz-dann-lesen-sie-weiter</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/lessons-from-the-malware-museum</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/data-security-platform</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/tendances-des-malwares-rapport-de-fevrier-2021</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/honeypot-nao-pode-ser-a-unica-solucao-de-seguranca-da-sua-empresa</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/automate-data-security-with-varonis-data-centric-insights-and-cortex-xsoar</loc><lastmod>2022-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-proxy-server</loc><lastmod>2022-06-24</lastmod></url><url><loc>https://www.varonis.com/it/blog/fsmo-roles</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/maitriser-la-fusion-dans-git</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cryptolocker-tout-ce-que-vous-devez-savoir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/it/coverage/microsoft-365</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/eu-dsgvo-rechte-in-bezug-auf-daten-und-sicherheitsverpflichtungen-infografik</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-part-i-risky-business</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-cssf-du-luxembourg-et-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/security-tactics</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/alphv-blackcat-ransomware</loc><lastmod>2022-03-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-active-directory-module</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-security</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/the-logging-dead-two-windows-event-log-vulnerabilities</loc><lastmod>2022-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/warum-es-nicht-immer-russische-hacker-sind-insider-die-unterschatzte-gefahr</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/least-privilege-automation</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/it/blog/ciso-security-plan</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/ai-data-classification</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/unternehmensweite-suche-die-verbindung-von-daten-und-wissen-teil-1</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/visual-studio-bug</loc><lastmod>2023-06-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/risikomanagement-framework</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/hhs-to-investigate-smaller-hipaa-privacy-breaches</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-ransomware-petya</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/es/coverage/confluence</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-why-your-team-is-your-greatest-cyber-asset-with-terry-inns</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tres-desafios-de-seguranca-para-o-trabalho-remoto-ao-redor-do-mundo-0</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/afinal-os-usuarios-windows-devem-ou-nao-trocar-as-suas-senhas-periodicamente</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/gen-ai-security</loc><lastmod>2024-08-30</lastmod></url><url><loc>https://www.varonis.com/customer-stories/enhancing-data-security-and-visibility-with-varonis-at-sugar-creek</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/box</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/trust/responsible-ai</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-identity-protection</loc><lastmod>2025-06-10</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-achieves-fedramp-authorization</loc><lastmod>2025-06-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rusty-pearl</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/einfuhrung-der-varonis-datensicherheitsplattform-6-4-100-varonis-edge-dsgvo-bedrohungsmodelle-geolokalisierung-und-mehr</loc><lastmod>2021-11-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/resolvendo-a-escassez-de-habilidades-de-seguranca-de-dados</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/mindsets-de-seguranca-de-dados-ceo-vs-cso/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-de-dados-2017-todos-estao-ameacados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/red-team-pensando-como-o-inimigo</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vpn-phishing-ataque-ao-azure-e-as-ameacas-modernas-ao-trabalho-remoto</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-c2</loc><lastmod>2022-08-08</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-cloud-security</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/conformite-gdpr-salesforce</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.varonis.com/de/case-studies</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/endpoint-detection-and-response-edr</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/active-directory-users-and-computers</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-5-hashwerte-knacken</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-active-directory-module</loc><lastmod>2022-01-10</lastmod></url><url><loc>https://www.varonis.com/blog/sspm-misconfiguration-detection</loc><lastmod>2024-04-05</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tres-perguntas-de-seguranca-que-os-executivos-deviam-fazer</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/fbi-phishing-website</loc><lastmod>2025-10-01</lastmod></url><url><loc>https://www.varonis.com/ja/blog/ai-data-security</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/outils-siem</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/azure-cli</loc><lastmod>2022-01-10</lastmod></url><url><loc>https://www.varonis.com/fr/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/role-based-access-control</loc><lastmod>2025-02-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/webhook-integration</loc><lastmod>2024-08-15</lastmod></url><url><loc>https://www.varonis.com/coverage/network</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/coverage/salesforce-agentforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/warum-sharepoint-berechtigungen-schwierigkeiten-verursachen</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-en-5-etapes-pour-reduire-le-risque-n-1-en-matiere-de-securite-des-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-bringing-resiliency-and-passion-to-cybersecurity-with-kieron-newsham</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-users-and-computers</loc><lastmod>2022-06-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/entenda-o-que-e-sspm-e-sua-importancia-para-a-seguranca-saas</loc><lastmod>2022-09-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-utiliser-wireshark</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cibercrime-e-uma-das-maiores-preocupacoes-dos-executivos</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/it/blog/ai-at-work</loc><lastmod>2023-11-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dspm-buyers-guide</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/third-party-app-risk-saas</loc><lastmod>2023-05-15</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-version-8-5-new-features-to-combat-insider-risk-in-microsoft-365</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/introducing-varonis-data-security-platform-6-4-100</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/authentifizierung-in-windows-10-das-ende-von-pass-the-hash-angriffen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-agentforce-tips</loc><lastmod>2024-12-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dspm-dashboard</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/zero-day-sicherheitslucken-eine-erklarung</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/alphv-blackcat-ransomware</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/supercharging-threat-detection-with-agentic-ai</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/blog/aws-remediation</loc><lastmod>2024-06-12</lastmod></url><url><loc>https://www.varonis.com/blog/ponemon-and-netdiligence-remind-us-data-breach-costs-can-be-huuuge</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/qual-a-diferenca-entre-dpl-siem-e-solucoes-de-seguranca-da-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/assurance-cyber-risques</loc><lastmod>2022-11-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/blog/concentrix</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://www.varonis.com/de/coverage/microsoft-365-copilot</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-terraform</loc><lastmod>2022-06-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-vs-cspm-solutions</loc><lastmod>2023-11-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/kubernetes-trends</loc><lastmod>2025-04-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vmware-esxi-na-linha-de-fogo-do-ransomware</loc><lastmod>2023-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-for-tribal-nations</loc><lastmod>2025-09-09</lastmod></url><url><loc>https://www.varonis.com/blog/gigaom-itdr</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/blog/1campaign</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-part-v-hash-dumping-and-cracking</loc><lastmod>2022-05-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/piratages-de-donnees-un-tour-du-monde</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-aflac-uses-varonis-to-safeguard-sensitive-data</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/emotet</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/reseau-virtuel-azure</loc><lastmod>2021-10-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/ausbesserung-von-zugriffskontrollen-ohne-einen-aufstand-anzuzetteln</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/pen-testing-active-directory-part-vi-final-case</loc><lastmod>2022-04-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/tirer-le-meilleur-parti-de-data-transport-engine</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/ja/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/fr/security-ecosystem-integrations</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/404</loc><lastmod>2022-01-05</lastmod></url><url><loc>https://www.varonis.com/fr/blog/matrixpdf</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/the-benefits-of-threat-and-data-breach-reports</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/multi-cloud-identity</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/power-automate-data-exfiltration</loc><lastmod>2022-02-03</lastmod></url><url><loc>https://www.varonis.com/ja/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-war-2023-so-wird-2024</loc><lastmod>2023-12-19</lastmod></url><url><loc>https://www.varonis.com/ja/blog/npm-hijacking</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-unternehmen-es-vermeiden-ihren-kunden-angst-zu-machen</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/security-risks-to-your-salesforce-org</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/blog/hardbit-2.0-ransomware</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/eu-gdpr-spotlight-pseudonymization-as-an-alternative-to-encryption</loc><lastmod>2021-10-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/reprompt</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/blog/prompt-hacking-microsoft-365-copilot</loc><lastmod>2024-09-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/understanding-and-applying-the-shared-responsibility-model</loc><lastmod>2024-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/cyber-resilience-assessment</loc><lastmod>2025-09-04</lastmod></url><url><loc>https://www.varonis.com/fr/blog/migration-des-donnees-guide-pour-reussir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/powershell-array</loc><lastmod>2022-04-07</lastmod></url><url><loc>https://www.varonis.com/coverage/databases</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/nist-csf-microsoft-365-copilot</loc><lastmod>2024-10-24</lastmod></url><url><loc>https://www.varonis.com/blog/the-difference-between-everyone-and-authenticated-users</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/es/coverage/servicenow</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/x64dbg-unpack-malware</loc><lastmod>2022-03-17</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-april-2025</loc><lastmod>2025-04-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/entenda-o-que-e-a-pericia-de-memoria-para-casos-de-resposta-a-incidentes</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-prevent-your-first-ai-data-breach</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.varonis.com/blog/nydfs-cybersecurity-regulation</loc><lastmod>2023-04-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/prevention-des-programmes-malveillants-sur-les-points-de-vente-quelques-conseils-efficaces</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-interceptor</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-for-cisos</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-volatility</loc><lastmod>2023-04-06</lastmod></url><url><loc>https://www.varonis.com/blog/australian-prudential-regulation-authority-cps-234</loc><lastmod>2022-06-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-o-que-seus-arquivos-corporativos-dizem-sobre-sua-estrategia-de-seguranca</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/es/solutions/policy-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/se-preparer-pour-le-reglement-general-sur-la-protection-des-donnees-de-lue</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/what-is-mddr</loc><lastmod>2024-06-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/rbac</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/bessere-zugangskontrollen-durch-hinzufugen-von-varonis-zum-iam</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/windows-defender-desactive-strategies-de-groupe</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/nur-was-man-kennt-kann-man-auch-schutzen-kennen-sie-ihre-vertraulichsten-inhalte</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tecnologia-deception-a-nova-estrategia-contra-ataques-ciberneticos</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utiliser-des-comptes-administrateur-local-windows-partie-ii</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/edr-security</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/sql-injection-verstehen-erkennen-und-verhindern</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/trust/privacy</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/empresa-multinacional-migra-arquivos-para-nuvem-com-o-datadvantage</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/servicenow</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/fr/platform/dspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/-dspm-gu%C3%ADa-de-pr%C3%A1ctica-para-cisos</loc><lastmod>2024-02-26</lastmod></url><url><loc>https://www.varonis.com/blog/practical-powershell-for-it-security-part-ii-file-access-analytics-faa</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/echoleak</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/introducing-ai-shield-always-on-ai-risk-defense</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/regles-yara</loc><lastmod>2023-10-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quelques-reflexions-sur-la-directive-nis-de-lue-au-lendemain-du-forum-de-davos</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dans-lunivers-des-menaces-internes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/the-dangers-of-shared-links</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-fazer-quando-a-sua-empresa-e-invadida</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/force-brute-anatomie-dune-attaque</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/5-grands-defis-pour-google-glass</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-database-security</loc><lastmod>2024-11-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-bicep</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/ai-at-work</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/bedrohungsmodellierung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-articles-du-rgpd-en-francais-simple</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/webinars</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/right-forgotten-ai</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-cybercriminalite-constitue-une-preoccupation-majeure-des-cadres-dirigeants</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/supercharging-threat-detection-with-agentic-ai</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/pestudio</loc><lastmod>2023-02-10</lastmod></url><url><loc>https://www.varonis.com/industry-recognition</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguran%C3%A7a-na-nuvem-seus-arquivos-podem-estar-em-risco</loc><lastmod>2022-08-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/lgpd-vai-exigir-novos-processos-na-coleta-e-no-tratamento-de-dados-dos-usuarios</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/penetration-testing</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-8.6-control-collaboration-chaos-in-microsoft-365-varonis</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/de/coverage/google-workspace</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/salesforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/ccpa-vs-gdpr</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/fraude-de-identidade-sintetica-conheca-os-desafios</loc><lastmod>2022-06-02</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/identifique-mais-cedo-os-riscos-de-ameacas-internas</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aduc</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-cybercriminalite-constitue-une-preoccupation-des-cadres-dirigeants</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/data-risk-assessment</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/cisos-first-90-days-action-plan-advice</loc><lastmod>2023-09-20</lastmod></url><url><loc>https://www.varonis.com/blog/pen-testing-active-directory-environments-part-iii-chasing-power-users</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/powershell-array</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/blog/monero-cryptominer</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-datenklassifizierung-richtlinien-und-prozess</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-02-07</lastmod></url><url><loc>https://www.varonis.com/es/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-migration-strategy</loc><lastmod>2024-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-praticas-que-dificultam-a-vida-dos-hackers</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/fixing-the-open-shares-problem</loc><lastmod>2021-10-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/e-mail-fluch-und-segen-moderner-kommunikation</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/betriebsrat-von-mitbestimmung-uberwachung-und-datenschutz</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/webhook-integration</loc><lastmod>2024-08-15</lastmod></url><url><loc>https://www.varonis.com/cyral</loc><lastmod>2025-03-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/ai-data-classification</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-6-fatores-que-podem-aumentar-a-seguranca-da-internet-das-coisas</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/bei-hackerangriff-op-verschoben-wie-sicher-sind-krankenhauser-und-patientendaten-wirklich-teil-2</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-data-security-roadmap-for-cisos</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/de/coverage/microsoft-365</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/implicacoes-de-seguranca-para-iot/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/phishing-explained</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/dsgvo-im-fokus-der-datenschutzbeauftragte-und-wann-er-eingestellt-werden-muss</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/spf-eintrage-verwenden-spam-und-spear-phishing-verhindern</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-cyclical-nature-of-data-with-shesh-kondi</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://www.varonis.com/it/coverage/chatgpt-enterprise</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-basics-of-cybersecurity-with-mark-wigham</loc><lastmod>2024-09-19</lastmod></url><url><loc>https://www.varonis.com/it/blog/itar-compliance</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/it/blog/behind-the-varonis-rebrand</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/blog/nmap-reverse-proxies</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-classification-labels-integration-mit-microsoft-information-protection-mip</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/it/blog/rethinking-database-security</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/blog/cisos-first-90-days-action-plan-advice</loc><lastmod>2023-08-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/pure-storage-partners</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/chatgpt-enterprise</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/7-principais-indicadores-de-risco-no-painel-do-varonis-active-directory/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/oauth-salesforce-apps</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/wir-sehen-uns-auf-der-it-sa-2023</loc><lastmod>2023-10-05</lastmod></url><url><loc>https://www.varonis.com/blog/windows-powershell-tutorials</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-domain-naming-best-practices</loc><lastmod>2023-04-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/qbot-varonis-expose-campagne-mondiale-de-cyberattaques</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-retorno-do-darkside-analise-de-uma-campanha-de-roubo-de-dados-em-larga-escala</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/m365-organizational-messages</loc><lastmod>2025-04-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/recherche-en-entreprise-les-big-data-ne-sont-pas-forcement-la-ou-vous-le-pensiez</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/neue-pii-entdeckt-aufnahmen-von-nummernschildern</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/identitatsdiebstahl-weiterhin-nr-1-bei-kundenbeschwerden</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-debuts-trailblazing-salesforce-security</loc><lastmod>2022-05-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-debuts-trailblazing-salesforce-security</loc><lastmod>2022-05-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dans-lunivers-des-menaces-internes-troisieme-partie-moyens-et-opportunite</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/echoleak</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-preparing-for-the-unknown</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/offene-freigaben</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/coverage/saas</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-quune-attaque-par-force-brute</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-find-active-directory-group-member</loc><lastmod>2022-04-07</lastmod></url><url><loc>https://www.varonis.com/de/company</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-adds-secrets-discovery</loc><lastmod>2022-10-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/automatisierte-bereinigung-von-berechtigungen-eine-grundliche-roi-analyse</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nocoes-basicas-sobre-plataformas-de-analise-de-seguranca/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/applocker-bypass-risks</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/pourquoi-luba-a-plus-de-chance-darreter-les-attaques-ransomware-zero-day</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-melhor-defesa-do-ransomware-e-a-limitacao-do-acesso-aos-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/data-privacy</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-bedrohungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/five-things-you-need-to-know-about-the-proposed-eu-general-data-protection-regulation</loc><lastmod>2022-05-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/automated-posture-management</loc><lastmod>2023-02-03</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-8.6-control-collaboration-chaos-in-microsoft-365-varonis</loc><lastmod>2023-05-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/power-automate-data-exfiltration</loc><lastmod>2022-03-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-teil-2-die-wichtigsten-typen-von-ransomware-und-welche-art-von-verschlusselung-sie-benutzen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-importance-of-data-privacy-with-jordan-mcclintick</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/ai-hides-malicious-sites</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://www.varonis.com/ja/blog/gartner-dspm</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-to-deal-with-sensitive-data-in-salesforce-a-guide-to-data-classification</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/blog/malware-coding-lessons-for-it-people-part-ii-more-fun-with-fud-ransomware</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-o-novo-dashboard-de-seguranca-da-varonis</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/generative-ai-security</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/blog/powerview-for-penetration-testing</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/vmware-esxi-in-the-line-of-ransomware-fire</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/when-a-cyber-attack-is-a-political-weapon</loc><lastmod>2022-05-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/alphv-blackcat-ransomware</loc><lastmod>2024-08-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/exfiltration-ntlm-hashes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/global-threat-trends-and-the-future-of-incident-response</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-ter-um-equilibrio-entre-seguranca-e-conveniencia</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/mais-de-40-das-empresas-tem-1-000-ou-mais-arquivos-sensiveis-abertos-a-todos-os-funcionarios/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataques-a-servicos-na-nuvem-no-brasil-conheca-os-riscos</loc><lastmod>2022-04-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/surveillance-flux</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-neuigkeiten-21-06</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/mimikatz-kezako</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-united-community-bank-reduces-their-blast-radius</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/state-of-data-security-report</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-secrets-de-la-prevention-des-attaques-de-points-de-vente</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/blog/exploiting-bginfo-to-infiltrate-a-corporate-network</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/detect-clean-cryptolocker-infections</loc><lastmod>2022-04-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/git-branching</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-as-principais-estatisticas-em-seguranca-digital-para-2020</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/it/coverage/mongodb</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nao-seja-uma-vitima-aprenda-a-se-defender-do-ransomware/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-audit</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-governance</loc><lastmod>2022-07-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-mirai-botnetz-oder-die-rache-des-iot</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-computer-virus-and-computer-worm</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/industry/finance</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-mapeia-alertas-de-seguranca-na-nuvem-para-mitre-attack</loc><lastmod>2022-10-26</lastmod></url><url><loc>https://www.varonis.com/state-of-cybercrime</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-killing-chain-durchbrechen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/nmap-proxys-inverses</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/taking-microsoft-office-by-storm</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/salesforce-agentforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/behind-the-varonis-rebrand</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conscientize-sua-organizacao-sobre-seguranca-cibernetica</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ein-weiteres-indiz-dafur-dass-cyberkriminalitat-noch-lange-nicht-am-ende-ist</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ransomware-hardbit-2.0</loc><lastmod>2023-03-31</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-aprender-com-o-ataque-a-equifax</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/coverage/box</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/difference-between-e3-and-e5-office365-features</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-devient-ultra-rapide-grace-a-solr</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-reduzir-amea%C3%A7as-de-ataques-cibern%C3%A9ticos</loc><lastmod>2022-06-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://www.varonis.com/fr/blog/chatgpt-enterprise</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/it/security-ecosystem-integrations</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/kerberos-como-parar-os-ataques-golden-tickets</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/aws-resource-control-policies</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/blog/how-varonis-helps-with-pci-dss-3-1</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/windows-file-system-auditing</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/annuler-une-validation-dans-git</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/microsoft-copilot-365-security</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/tendances-des-malwares-rapport-de-novembre-2020</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis.com/blog/data-lifecycle-automation</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/generative-ai-security</loc><lastmod>2025-04-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/disable-salesforce-public-links</loc><lastmod>2024-08-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-varonis-pode-ajudar-sua-empresa-a-descobrir-os-dados-sensiveis-a-gdpr</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/emotet</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-os-principais-desafios-dos-profissionais-de-ti</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/global-data-risk-report-2019</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/novos-ataques-ao-active-directory-exploram-vulnerabilidade-do-kerberos</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-a-security-policy</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-retrouver-les-groupes-active-directory-dont-je-suis-membre</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com/ja/blog/dspm-buyers-guide</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/2021-healthcare-data-risk-report</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-nonmalicious-insider-with-rachel-beard</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.varonis.com/blog/cryptolocker</loc><lastmod>2023-05-26</lastmod></url><url><loc>https://www.varonis.com/blog/forrester-wave-data-security-platforms</loc><lastmod>2024-02-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-oferecer-uma-busca-corporativa-segura-e-eficiente</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/backoff-die-ruckkehr-der-pos-cyberangriffe</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/neue-mirai-angriffe-aber-es-geht-noch-immer-um-passworter</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/save-the-queen-ransomware</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-interceptor</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/3-deadly-file-permissions-mistakes</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/sicherheitslucke-im-exchange-so-erkennen-sie-eine-eskalation-von-domain-admin-berechtigungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/alguns-insighs-sobre-a-analise-de-comportamento-de-entidade-do-usuario-ueba</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/arm-template</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/es/coverage/google-cloud</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/automate-exchange-distribution-list-management</loc><lastmod>2022-02-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/working-in-cybersecurity</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/azure-database-security</loc><lastmod>2024-11-15</lastmod></url><url><loc>https://www.varonis.com/de/platform/dlp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/verwenden-von-autoruns</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/platform/database-activity-monitoring</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/5-metricas-de-resiliencia-cibernetica-para-acompanhar</loc><lastmod>2022-07-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetration-testing</loc><lastmod>2022-06-12</lastmod></url><url><loc>https://www.varonis.com</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/novos-ataques-ressaltam-a-importancia-dos-usuarios-com-privilegios</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/port-scanning-techniques</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ransomware-solidbit-anatomia-de-um-ataque</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/fr/blog/three-ways-varonis-helps-fight-insider-threats</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/5-herausforderungen-im-umgang-mit-google-glass</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/de/blog/disable-salesforce-public-links</loc><lastmod>2024-07-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saas-data-risk-report</loc><lastmod>2025-02-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/introducing-ai-shield-always-on-ai-risk-defense</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/blog/search-kerbeross-golden-ticket</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/malware-analysis-tools</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-six-part-guide-to-penetration-testing</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/snowflake-data-security</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/datadvantage-et-datalert-de-varonis-sont-desormais-interoperables-avec-la-plate-forme-dintelligence-de-securite-de-logrhythm</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/spotlight-eu-datenschutzgrundverordnung-benachrichtigung-binnen-72-stunden</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ferramentas-de-seguranca-de-dados-x-ferramentas-de-resiliencia-de-dados</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/guide-de-conformite-a-la-norme-pci-dss-3-2-checklist-des-choses-a-faire-et-a-eviter</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/capture-de-paquets</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-cerber-ce-que-vous-devez-savoir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenbroker-zu-viele-informationen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sentinelone-microsoft-defender-integration</loc><lastmod>2024-08-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/criminal-minds-denken-wie-ein-hacker-kann-data-governance-verbessern</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/massive-ausbreitung-von-ransomware-was-sie-jetzt-wissen-mussen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-bash-und-powershell</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-meets-its-match-with-automated-cyber-defenses</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/acht-ereignisse-die-die-cybersecurity-verandert-haben</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/ja/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/active-directory-sicherer-machen-9-empfehlungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/empresas-da-area-da-saude-correm-risco-iminente-de-vazamento-de-dados</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/chatgpt-dlp-what-enterprises-need-to-know</loc><lastmod>2025-07-28</lastmod></url><url><loc>https://www.varonis.com/ja/blog/scaling-accurate-classification</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/es/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/de/blog/herausforderung-tisax-meistern-und-datensicherheit-erhohen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-kerberos-edition-silver-ticket</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/8-wichtige-eigenschaften-einer-auditing-software</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/what-is-bec-business-email-compromise</loc><lastmod>2025-12-15</lastmod></url><url><loc>https://www.varonis.com/fr/platform/identity-posture</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/devil-traff</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/neue-eu-datenschutzgesetze</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/understanding-and-applying-the-shared-responsibility-model</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sindrome-do-impostor-bug-da-interface-do-usu%C3%A1rio-no-visual-studio-permite-que-invasores-representem-editores</loc><lastmod>2023-06-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dsp2</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/21-free-tools-every-sysadmin-know</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/it/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/pass-the-hash-angriffe-genauer-betrachtet-teil-2</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-shield-data-security</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-o-roteiro-de-seguranca-de-dados-que-usamos-com-mais-de-7-mil-cisos</loc><lastmod>2023-06-05</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-shield</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/rgpd-de-lue-droits-sur-les-donnees-et-obligations-en-matiere-de-securite-infographie</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/fix-salesforce-permissions</loc><lastmod>2025-06-24</lastmod></url><url><loc>https://www.varonis.com/blog/march-2021-malware-trends-report</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-november-2024</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/it/blog/how-to-prepare-for-a-salesforce-permissions-audit</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/es/blog/dspm-use-cases</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-luba-ou-analyse-du-comportement-des-utilisateurs</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/editeur-strategie-de-groupe-locale</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/windows-10s-security-reboot-part-iii-fido-beyond</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/fr/blog/datadvantage-pour-exchange-online-est-la</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/compliance-brief-sarbanes-oxley-sox/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-a-nova-ferramenta-da-varonis-para-identificar-ransomwares</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/blog/arp-poisoning</loc><lastmod>2022-08-04</lastmod></url><url><loc>https://www.varonis.com/blog/zero-day-vulnerability</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/best-practices-fur-sql-server-teil-2-virtualisierte-umgebungen</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/debunking-dspm-myths</loc><lastmod>2023-11-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/8-dicas-para-sobreviver-ao-apocalipse-da-seguranca-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/cinco-etapas-criticas-para-se-recuperar-de-um-ataque-de-ransomware</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/blog/exchange-journaling-and-diagnostics-how-to</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-opens-uk-data-centre-0</loc><lastmod>2023-09-08</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-compliance-datadvantage-part-iii-protect-monitor</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/working-with-windows-local-administrator-accounts-part-iii</loc><lastmod>2022-02-10</lastmod></url><url><loc>https://www.varonis.com/solutions/compliance-management</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/multi-cloud-security-challenges</loc><lastmod>2025-06-12</lastmod></url><url><loc>https://www.varonis.com/it/blog/data-classification-amazon-s3</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/ciso-security-plan</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-introduces-athena-ai</loc><lastmod>2023-11-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-shield-data-security</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/tendances-des-malwares-rapport-doctobre-2020</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/vier-gewinner-und-eine-gro%C3%9Fe-siegerin-die-datensicherheit-0</loc><lastmod>2025-01-17</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-explained-part-ii-rats</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/industry-recognition</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/blog/data-breach-statistics</loc><lastmod>2025-11-07</lastmod></url><url><loc>https://www.varonis.com/blog/dns-cache-poisoning</loc><lastmod>2022-08-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/top-tutorials-fur-azure-active-directory</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-data-security-best-practices</loc><lastmod>2025-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/onformidade-com-o-soc-2</loc><lastmod>2023-04-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/privileged-access-management</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-cas-de-reality-leah-winner-et-lere-des-menaces-internes</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/diebstahl-geistigen-eigentums-teil-4-ambitionierte-insider</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/exfiltration-hachages-ntlm</loc><lastmod>2021-10-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/verbindung-zum-active-directory-domain-controller-addc-konnte-nicht-hergestellt-werden-gelost</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/servicenow</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-risiken-anleitung-fur-ciso</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/add-varonis-to-iam</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/blog/pen-testing-active-directory-environments-part-introduction-crackmapexec-powerview</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/it/blog/power-automate-data-exfiltration</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/memoire-de-la-pile-3</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/scaling-accurate-classification</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://www.varonis.com/ja/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/2019-data-risk-report</loc><lastmod>2021-09-23</lastmod></url><url><loc>https://www.varonis.com/blog/fsmo-roles</loc><lastmod>2022-12-20</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dlp-entenda-a-importancia-desse-recurso/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-man-x64dbg-gehort</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/hacker-motives</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/le-droit-a-oubli</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/ein-paar-gedanken-uber-datensicherheitsstandards</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/blog/gartner-dspm</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://www.varonis.com/blog/rusty-pearl</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/datanywhere-ab-sofort-fur-bis-zu-funf-nutzer-kostenfrei-downloaden</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/automated-dspm</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-grandes-empresas-encontram-vazamentos</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/cyber-attack-prep</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/garanta-a-governanca-dos-dados-com-o-uso-de-relatorios</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/it/blog/webhook-integration</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/it/coverage/confluence</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/utilize-tecnologia-da-varonis-para-a-protecao-dos-dados-contra-virus-de-rootkit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/platform/browser-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/secure-snowflake-data</loc><lastmod>2025-06-25</lastmod></url><url><loc>https://www.varonis.com/blog/proxy-vs-vpn</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/kerberos-how-to-stop-golden-tickets</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/nmap-commands</loc><lastmod>2022-05-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/john-the-ripper</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-06-28</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/kerberoasting-still-matters</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/scanner-de-ports-description-et-fonctionnement-techniques-de-balayage-de-ports</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/data-classification</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/empoisonnement-arp</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/industry/healthcare</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-mimikatz-guia-completo</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quando-ataques-ciberneticos-se-tornam-armas-politicas/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/azure-access-graph</loc><lastmod>2025-04-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-dataprivilege-und-rsa-identity-governance-and-lifecycle</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-spear-phishing</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-prepare-for-a-salesforce-permissions-audit</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/solutions/sspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/samas-cerber-surprise-drei-neue-ransomware-varianten-die-sie-kennen-sollten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-centuri-group-secures-data-and-rests-easy</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/internet-das-coisas-medicas-os-beneficios-e-desafios-para-a-seguranca-da-informacao/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/es/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/preventing-s3-bucket-namesquatting</loc><lastmod>2025-01-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/unternehmensweite-suche-daten-und-wissen-gehoren-zusammen-teil-2</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-para-ia-generativa-evitando-a-exposicao-de-dados-do-microsoft-copilot</loc><lastmod>2023-10-17</lastmod></url><url><loc>https://www.varonis.com/platform/identity-resolution</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/it/blog/pure-storage-partners</loc><lastmod>2025-04-28</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-traceroute</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-de-revil-contre-kaseya-vsa-tout-ce-quil-faut-savoir</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/protect-cloud-data</loc><lastmod>2025-07-22</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-couts-des-intrusions-sont-eleves-pourquoi-cette-question</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-varonis-ajudou-o-havas-media-a-sair-na-frente</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/automated-posture-management</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ceo-vs-cso-parte-2-risco-de-violacao-investimento-em-seguranca-e-pensar-como-um-mba</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/dnsmessenger-2017s-beloved-remote-access-trojan-rat</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/blog/data-security-trends</loc><lastmod>2025-01-22</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-powershell-objects-and-data-piping</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/the-principles-of-grc-with-hannah-dewane</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/working-in-cybersecurity</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comprendre-le-piratage-sans-malware-partie-i</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/blog/incident-response-plan</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-funciona-o-cdm-e-como-a-varonis-pode-ajudar</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/pass-the-hash-angriffe-genauer-betrachtet-teil-1</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/rethinking-database-security</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/how-to-prepare-for-a-salesforce-permissions-audit</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/blog/gdpr-data-protection-authority-supervisory-listing</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/how-the-moveit-vulnerability-impacts-federal-government-agencies</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/explicando-a-ameaca-persistente-avancada-apt/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/coverage/confluence</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/de/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/customer-stories/implementing-least-privilege-at-scale-to-secure-healthcare-data</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/automatizar-o-processo-de-permissoes-ajuda-a-reduzir-custos-e-tempo-de-implementacao</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/es/blog/supercharging-threat-detection-with-agentic-ai</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tempo-de-resposta-a-violacoes-de-dados-tendencias-e-dicas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/the-journey-to-file-permission-perfection</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/security-ecosystem-integrations</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/security-tactics</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.varonis.com/de/company/contact</loc><lastmod>2026-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/serveur-proxy</loc><lastmod>2022-07-28</lastmod></url><url><loc>https://www.varonis.com/blog/risks-of-url-rewriting</loc><lastmod>2025-11-05</lastmod></url><url><loc>https://www.varonis.com/es/blog/generative-ai-security</loc><lastmod>2024-02-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/statistiken-zu-datenschutzverletzungen</loc><lastmod>2022-08-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-proteger-dados-de-aplicativos-saas-na-nuvem</loc><lastmod>2023-04-15</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-freigaben-und-ntfs-berechtigungen</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/fast-and-easy-agentless-cloud-deployment</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-data-governance-suite-5-8-schneller-schlanker-gunstiger</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/wurde-die-dsgvo-bereits-gelten-musste-yahoo-einen-grosen-scheck-ausstellen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/7-configuracoes-de-seguranca-para-uma-nova-aws</loc><lastmod>2023-01-17</lastmod></url><url><loc>https://www.varonis.com/de/blog/configuration-drift</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://www.varonis.com/de/security-ecosystem-integrations</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/aznfs-root-privilege-escalation-on-azure</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/coverage/azure</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-trouver-les-groupes-active-directory-dont-je-suis-membre</loc><lastmod>2021-10-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/aufbewahrungsfristen-von-daten-im-zeitalter-der-sozialen-medien</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/the-future-of-cloud-data-security-doing-more-with-dspm</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/behind-the-varonis-rebrand</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/security-risks-to-your-salesforce-org</loc><lastmod>2023-09-20</lastmod></url><url><loc>https://www.varonis.com/fr/industry-recognition</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/blog/new-pii-discovered-license-plate-pictures</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-ist-ein-whaling-angriff</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-statistics</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://www.varonis.com/es/blog/url-rewriting-exploit</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/convenca-o-ceo-da-importancia-da-seguranca-da-informacao</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/seguranca-cibernetica-como-parte-da-governanca-corporativa</loc><lastmod>2022-03-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gestion-des-acces-a-privileges</loc><lastmod>2023-06-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/compare-salesforce-user-permissions-with-ease</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/blog/cia-triad</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ai-data-classification</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/de/solutions/cloud-data-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-a-negligencia-ainda-causa-tantos-incidentes-de-seguranca/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-nov-2023</loc><lastmod>2023-11-21</lastmod></url><url><loc>https://www.varonis.com/blog/2021-financial-data-risk-report</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/12-wege-wie-varonis-sie-bei-der-steuerung-von-fusionen-und-ubernahmen-unterstutzt</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/dspm-in-the-cloud</loc><lastmod>2025-06-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/insider-bedrohungen-teil-1</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/new-updates-to-the-cis-critical-security-controls</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/blog/sharepoint-permissions-cheat-sheet</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/utiliser-varonis-commencer-par-la-classification</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/link-protect-ist-unser-growth-partner-of-the-year</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/es/solutions/cloud-data-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/identidades-gerenciadas-do-azure-definicao-tipos-beneficios-e-demonstracao</loc><lastmod>2022-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/smb-port</loc><lastmod>2023-09-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/proactive-incident-response</loc><lastmod>2023-02-03</lastmod></url><url><loc>https://www.varonis.com/blog/astaroth-phishing-kit</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cloudpro-laccord-de-confidentialite-est-il-le-chainon-manquant</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/autres-relations-entre-phishing-et-metadonnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/was-sie-wissen-sollten-bevor-sie-auf-office-365-umsteigen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/aws-keys</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/smb-port</loc><lastmod>2023-09-19</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-data-loss-prevention-dlp</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/blog/defining-deviancy-user-behavior-analytics</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/detecting-honeypot-varonis</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-managed-identities</loc><lastmod>2023-04-07</lastmod></url><url><loc>https://www.varonis.com/platform/email-security</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/confianca-zero-o-que-voce-ganha-com-essa-abordagem-de-seguranca</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/recherche-globale-en-entreprise-aspects-sociaux-et-confidentialite</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/commencez-a-vous-tracasser-pour-des-broutilles</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/prevent-m365-abuse</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://www.varonis.com/es/blog/salesforce-user-impersonation</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/global-threat-trends-and-the-future-of-incident-response</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-ransomware</loc><lastmod>2022-08-04</lastmod></url><url><loc>https://www.varonis.com/it/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-next-generation-of-cybersecurity-with-mark-weber</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-may-2023</loc><lastmod>2023-05-30</lastmod></url><url><loc>https://www.varonis.com/fr/platform/mddr</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-os-erros-que-permitem-aos-hackers-passarem-despercebidos</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/blog/purview-dspm-integration</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://www.varonis.com/it/blog/disable-salesforce-public-links</loc><lastmod>2024-07-26</lastmod></url><url><loc>https://www.varonis.com/blog/how-honeypots-unmask-hackers-scammers-online</loc><lastmod>2022-10-12</lastmod></url><url><loc>https://www.varonis.com/fr/blog/revelation-des-donnees-personnelles-secretes-dans-vos-donnees-non-structurees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-version-7-0</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/gunstig-um-jeden-preis-drei-dinge-auf-die-sie-bei-kostengunstigen-backup-losungen-achten-sollten</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-for-cisos</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-presente-datadvantage-cloud-une-securite-centree-sur-les-donnees-pour-les-applications-saas-et-iaas</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-actualites-08-09</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/salesforce-security-guide</loc><lastmod>2024-09-25</lastmod></url><url><loc>https://www.varonis.com/it/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-obfuscation-stealth-confusion-part-ii</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/partners/locator</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sete-melhores-praticas-para-migracao-para-a-nuvem</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-adds-secrets-discovery</loc><lastmod>2022-10-19</lastmod></url><url><loc>https://www.varonis.com/de/blog/microsoft-partnership</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/data-ng-ist-neuer-varonis-certified-delivery-partner</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-dataprivilege-et-rsa-identity-governance-and-lifecycle</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/blog/data-integrity</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/explication-de-lauthentification-kerberos</loc><lastmod>2023-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/mind-games</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://www.varonis.com/platform/data-centric-ueba</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-identificar-perfis-internos-que-podem-expor-sua-empresa-ao-risco</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/navigating-data-protection-in-the-federal-sector</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dados-saas-expostos</loc><lastmod>2023-01-17</lastmod></url><url><loc>https://www.varonis.com/blog/events-that-changed-cybersecurity</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-g2-leader-26</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/blog/rethinking-database-security</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-quun-siem-guide-du-debutant</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/azure-compliance</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/diferencas-entre-seguranca-cibernetica-e-resiliencia-cibernetica</loc><lastmod>2022-05-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dans-lunivers-des-menaces-internes-deuxieme-partie-plus-sur-la-motivation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-a-proxy-server</loc><lastmod>2023-01-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/kontroverses-in-der-eu-dsgvo-infografik</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/es/blog/atlas-ai-security</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://www.varonis.com/blog/third-party-app-risk-saas</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-planejamento-de-seguranca-digital-deve-comecar-com-os-dados-certos/</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-o-papel-do-lider-de-seguranca-cibernetica-esta-mudando</loc><lastmod>2022-07-26</lastmod></url><url><loc>https://www.varonis.com/de/blog/end-of-life-windows-server-2003</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/vmware-esxi-in-the-line-of-ransomware-fire</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/blog/sharepoint-folder-fallacy</loc><lastmod>2025-03-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/politicas-de-privacidade-aceitar-sem-ler-e-habito-comum-entre-os-internautas/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/coverage/network</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaque-massive-par-ransomware-ce-que-vous-devez-savoir</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/linformatique-doit-elle-etre-tyrannique-pour-assurer-la-securite-a-lage-du-byod</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/optimale-ausnutzung-der-data-transport-engine</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/chatgpt-enterprise</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-ghidra</loc><lastmod>2023-04-06</lastmod></url><url><loc>https://www.varonis.com/blog/taking-microsoft-office-by-storm</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/gestion-risque-tierces-parties</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/why-a-honeypot-is-not-a-comprehensive-security-solution</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-23-11</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/ntfs-permissions-vs-share</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/otimize-o-uso-das-metricas-de-seguranca-da-informacao/</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/shadow-ai</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/blog/aws-resource-control-policies</loc><lastmod>2024-12-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/vol-donnees-employe</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/roubo-de-identidade-corporativa-ameaca-reputacao-e-gera-perdas-financeiras-graves</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/automate-data-security-with-varonis-data-centric-insights-and-cortex-xsoar</loc><lastmod>2024-01-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/malware-coding-fur-it-ler-teil-ii-fun-mit-fud-ransomware</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/ccsp-vs-cissp</loc><lastmod>2022-04-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-deal-with-sensitive-data-in-salesforce-a-guide-to-data-classification</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-august-2024</loc><lastmod>2024-08-29</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-wireshark</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/quatro-estrategias-para-tirar-mais-vantagens-da-gestao-de-dados</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-bericht-zu-malware-trends-im-marz-2021</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/ja/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/what-is-dspm</loc><lastmod>2025-06-23</lastmod></url><url><loc>https://www.varonis.com/es/industry-recognition</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/blog/mcp-server</loc><lastmod>2025-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/ist-ein-dcom-distributed-component-object-model</loc><lastmod>2023-07-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/datenrisikobericht-2018</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/guide-to-rsac-2024</loc><lastmod>2024-04-03</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-enhances-cloud-security-alerts-with-mitre-attck-tactics</loc><lastmod>2023-06-12</lastmod></url><url><loc>https://www.varonis.com/de/blog/dateifreigaben-im-unternehmen-dateisynchronisierung-und-zugriff-%C3%BCber-mobile-endger%C3%A4te</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ciso-security-plan</loc><lastmod>2024-12-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-7-exfiltration-und-schlussfolgerungen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/guide-eu-gdpr-breach-notification-rule</loc><lastmod>2022-04-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-datadvantage-ganha-titulo-de-solucao-inovadora</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/quest-ce-que-le-reglement-general-sur-la-protection-des-donnees-de-lue</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/misconfigurations-in-azure-networking-and-firewalls</loc><lastmod>2025-04-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/um-ano-na-vida-do-gdpr</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/atroposia-rat</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/two-factor-authentication</loc><lastmod>2021-10-21</lastmod></url><url><loc>https://www.varonis.com/blog/adventures-in-malware-free-hacking-part-iv</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/maneiras-de-proteger-o-active-directory</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/un-effacement-des-donnees-responsable-grace-a-lautomatisation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/infrastructure-as-code</loc><lastmod>2025-05-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-nutzen-mit-der-datenklassifizierung-beginnen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/what-is-dspm</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/global-threat-trends-and-the-future-of-incident-response</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/uba-devera-ajudar-na-educacao-do-funcionario</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/detecting-agentic-ai-threats</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/voce-considera-seus-dados-seguros-entao-responda-a-essas-tres-perguntas</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/pci-dss-und-zwei-faktor-authentifizierung-die-fakten</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-idor-insecure-direct-object-reference</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nova-variacao-de-ransomware-apaga-seus-arquivos</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/industry/education</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/security-tactics</loc><lastmod>2024-10-14</lastmod></url><url><loc>https://www.varonis.com/it/blog/salesforce-site-exposure</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/blog/top-five-dangerous-software-errors</loc><lastmod>2021-10-22</lastmod></url><url><loc>https://www.varonis.com/de/blog/sans-umfrage-zur-ereignisprotokollierung</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/pen-testing-active-directory-v-admins-graphs</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sinais-que-sua-empresa-esta-sendo-atacada-por-uma-ameaca-persistente-avancada-apt</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-tips-for-safeguarding-sensitive-data-with-jon-densmore</loc><lastmod>2024-07-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-unterschatzte-gefahr-externe-dienstleister-ein-sicherheitsrisiko</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/security-data-ai-fabric</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://www.varonis.com/it/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-dam</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://www.varonis.com/es/blog/varonis-introduces-athena-ai</loc><lastmod>2024-03-07</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-december-2024</loc><lastmod>2024-12-19</lastmod></url><url><loc>https://www.varonis.com/blog/guide-no-hassle-eql-threat-hunting</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/think-your-data-is-secure-three-questions-you-need-to-answer-right-now</loc><lastmod>2022-01-05</lastmod></url><url><loc>https://www.varonis.com/ja/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/authentification-a-deux-facteurs</loc><lastmod>2022-06-29</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/policy-automation</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-interceptor</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/insiderbedrohungen-und-e-spionage</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/siem-tools</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-april-2024</loc><lastmod>2024-05-01</lastmod></url><url><loc>https://www.varonis.com/blog/shield-act-will-update-new-york-states-breach-notification-law</loc><lastmod>2022-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/modelisation-des-menaces-les-6-erreurs-que-vous-faites-probablement</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/de/blog/social-engineering-im-unternehmen</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/fr/blog/aws-vs-azure-vs-google</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/blog/i-click-therefore-i-exist-disturbing-research-on-phishing</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/mergen-in-git</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/aws-security-hub-integration</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://www.varonis.com/blog/group-policy-best-practices</loc><lastmod>2024-02-07</lastmod></url><url><loc>https://www.varonis.com/blog/azure-sentinel-guide</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/blog/group-policy-editor</loc><lastmod>2022-01-05</lastmod></url><url><loc>https://www.varonis.com/fr/blog/debunking-dspm-myths</loc><lastmod>2023-10-09</lastmod></url><url><loc>https://www.varonis.com/protect-patient-data-hospital-cancer-center-moffit</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://www.varonis.com/es/blog/introducing-ai-shield-always-on-ai-risk-defense</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/de/platform/data-access-governance</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/customer-stories/protecting-millions-of-files-varonis</loc><lastmod>2026-03-04</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-voce-precisa-saber-sobre-o-krack-2/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/licht-am-ende-des-tunnels-die-eu-datenschutzverordnung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/rippling-vs-deel</loc><lastmod>2025-03-28</lastmod></url><url><loc>https://www.varonis.com/platform/athena-ai</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-telemetry</loc><lastmod>2025-05-30</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-skills-shortage</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/blog/cybersecurity-ted-talks</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-legislation-sur-la-cybersecurite-se-renforce-avec-la-nouvelle-directive-europeenne-sur-la-securite-des-reseaux-et-des-systemes-dinformation</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/modernizar-seu-mainframe-e-essencial-para-a-seguranca-corporativa/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/snowflake-data-security</loc><lastmod>2024-02-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/the-identity-crisis-research-report</loc><lastmod>2025-02-11</lastmod></url><url><loc>https://www.varonis.com/solutions/insider-risk-management</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/blog/azure-active-directory</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/fr/blog/securite-edr</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/penetration-testing-tools</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/finding-eu-personal-data-with-gdpr-patterns</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/blog/sidestepping-detection-while-exfiltrating-sharepoint-data</loc><lastmod>2024-04-11</lastmod></url><url><loc>https://www.varonis.com/es/platform/dlp</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/ein-anderer-name-fur-dsgvo-das-neue-britische-datenschutzgesetz-data-protection-bill</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/is-your-org-ready-for-microsoft-copilot</loc><lastmod>2025-06-18</lastmod></url><url><loc>https://www.varonis.com/blog/cyber-kill-chain</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/blog/security-leaders-salesforce-and-social-consciousness-with-doug-merrett</loc><lastmod>2024-04-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/vos-donnees-sont-votre-miroir</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/violacoes-de-dados-seguem-em-ritmo-recorde-em-2017</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog</loc><lastmod>2024-09-21</lastmod></url><url><loc>https://www.varonis.com/blog/sql-injection-identification-and-prevention-part-1</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/dspm-dashboard</loc><lastmod>2023-02-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-a-varonis-aprimora-seus-modelos-de-uba</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-07-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-to-acquire-slash-next-email-security</loc><lastmod>2025-09-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/why-your-org-needs-a-copilot-security-scan</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-dramaturgie-der-daten-wie-bsi-grundschutz-und-data-governance-zusammenhangen</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/delais-de-reponse-aux-violations-de-donnees</loc><lastmod>2022-07-07</lastmod></url><url><loc>https://www.varonis.com/blog/automated-posture-management</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/automated-dspm</loc><lastmod>2024-07-12</lastmod></url><url><loc>https://www.varonis.com/blog/ransomware-targets-aws-s3-buckets</loc><lastmod>2025-01-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/top-cybersecurity-trends-for-2023</loc><lastmod>2023-09-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/pesquisa-aponta-dados-sobre-ameacas-internas</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/es/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/servicenow</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-saml</loc><lastmod>2022-06-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/das-neue-it-sicherheitsgesetz-fur-kritische-infrastrukturen-empfehlungen-und-anforderungen</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/llm-security-risks</loc><lastmod>2024-11-07</lastmod></url><url><loc>https://www.varonis.com/blog/man-in-the-middle-attack</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/realidade-aumentada-e-hora-de-falar-serio</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-with-illena-armstrong</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/password-spraying</loc><lastmod>2022-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ransomware-vivemos-uma-nova-era-de-ataques</loc><lastmod>2022-07-01</lastmod></url><url><loc>https://www.varonis.com/it/blog/active-directory-users-and-computers</loc><lastmod>2024-03-12</lastmod></url><url><loc>https://www.varonis.com/solutions/ransomware-prevention</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/illinois-privacy-law</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/fr/blog/data-security</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/attaques-de-phishing</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/obfuscation-du-powershell-sinfiltrer-en-profitant-de-la-confusion-partie-ii</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/es/blog/purview-dspm-integration</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/stellt-ein-ransomware-angriff-eine-datenschutzverletzung-dar</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/lindustrie-hoteliere-a-un-probleme-de-malware-de-points-de-vente</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/brute-force-attack</loc><lastmod>2022-01-19</lastmod></url><url><loc>https://www.varonis.com/es/blog/kubernetes-trends</loc><lastmod>2025-04-08</lastmod></url><url><loc>https://www.varonis.com/blog/how-varonis-data-risk-assessment-works</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://www.varonis.com/de/blog/zwei-faktor-authentifizierung</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/insider-threats</loc><lastmod>2024-11-13</lastmod></url><url><loc>https://www.varonis.com/fr/blog/git-branching</loc><lastmod>2025-03-20</lastmod></url><url><loc>https://www.varonis.com/fr/blog/manufacturing-data-risk-report-reveals-files-open-to-all-employees</loc><lastmod>2022-01-20</lastmod></url><url><loc>https://www.varonis.com/de/coverage/azure-files</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/limit-organization-wide-exposure</loc><lastmod>2023-06-02</lastmod></url><url><loc>https://www.varonis.com/de/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes</loc><lastmod>2024-04-26</lastmod></url><url><loc>https://www.varonis.com/es/blog/mcp-server</loc><lastmod>2025-06-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/dspm-use-cases</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-dam</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/fr/blog/migration-des-donnees</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/url-spoofing</loc><lastmod>2022-08-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/multi-cloud-identity</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/conheca-tres-novas-variantes-de-ransomware-que-devem-estar-no-seu-radar</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/solucoes-pontuais-podem-comprometer-a-seguranca-digital</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/blog/the-superpower-of-grc</loc><lastmod>2025-05-05</lastmod></url><url><loc>https://www.varonis.com/de/blog/hacker-tales-mit-einem-kleinen-unfall-fing-alles-an-teil-2</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-february-2025</loc><lastmod>2025-02-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/box-mfa-bypass-totp</loc><lastmod>2022-01-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-5-principales-preoccupations-des-professionnels-de-la-cybersecurite</loc><lastmod>2021-11-04</lastmod></url><url><loc>https://www.varonis.com/it/blog/what-is-mddr</loc><lastmod>2024-06-24</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-perimetro-nao-e-mais-suficiente-para-garantir-seguranca-na-nuvem-saiba-por-que</loc><lastmod>2021-10-27</lastmod></url><url><loc>https://www.varonis.com/it/blog/microsoft-partnership</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/azure-database-security</loc><lastmod>2024-11-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/best-practices-fur-die-berechtigungserteilung-unter-sharepoint</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/it/blog/varonis-for-confluence</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-windows-server-active-directory-und-azure-ad</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/warum-datenmigration-auf-ihrer-to-do-liste-fur-den-herbst-stehen-sollte</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/impact-of-ai-adoption-engineering</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-varonis-data-risk-assessment-works</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://www.varonis.com/ja/blog/microsoft-partnership</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://www.varonis.com/blog/pan-os-zero-day</loc><lastmod>2024-04-16</lastmod></url><url><loc>https://www.varonis.com/de/blog/cism-vs-cissp-zertifizierung-welche-option-ist-die-bessere-fur-sie</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/fr/blog/la-menace-importante-deja-dans-votre-organisation</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/fr/blog/microsoft-partnership</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/saas</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/announcing-the-varonis-ransomware-identifier</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-apporte-une-capacite-de-securite-des-donnees-a-nasuni</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/spot-phishing-scam</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-variable-scope</loc><lastmod>2022-10-13</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-proteger-suas-contas-privilegiadas</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/matrixpdf</loc><lastmod>2025-09-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/wer-versucht-auf-ihre-daten-zuzugreifen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/dsgvo-konformit%C3%A4t-sch%C3%BCtzt-auch-vor-ransomware-sch%C3%A4den</loc><lastmod>2022-05-31</lastmod></url><url><loc>https://www.varonis.com/de/blog/ai-data-classification</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ataque-bec-e-ainda-mais-devastador-que-wannacry-e-petya</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/exchange-verteilerlisten-automatisiert-verwalten</loc><lastmod>2022-07-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/illinois-privacy-law</loc><lastmod>2023-01-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/ransomware-teil-4-ransomware-varianten-wer-ist-betroffen-und-was-kann-man-tun</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/unternehmensweite-suche-die-verbindung-von-daten-und-wissen-teil-3</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/es/blog/a-practical-guide-to-safely-deploying-gen-ai</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/les-10-meilleurs-tutoriels-web-sur-active-directory</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/plataformas-de-seguranca-de-dados-forrester-wave</loc><lastmod>2023-08-29</lastmod></url><url><loc>https://www.varonis.com/fr/solutions/ai-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/de/blog/untersuchung-der-windows-dateiaktivitat-mithilfe-des-ereignisprotokolls-von-windows</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/azure-database-security</loc><lastmod>2024-11-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/ihr-postfach-ist-fast-voll</loc><lastmod>2022-07-28</lastmod></url><url><loc>https://www.varonis.com/blog/phishwp-wordpress-plugin</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/cloud-security-challenges</loc><lastmod>2025-02-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/cybersecurity-trends</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/erros-comuns-das-startups-na-seguranca-da-informacao</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/coverage/microsoft-365</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/fr/coverage</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/data-governance-in-healthcare</loc><lastmod>2025-04-04</lastmod></url><url><loc>https://www.varonis.com/es/platform/email-security</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/customer-stories/how-saia-reduced-costs-improved-security-and-migrated-to-the-cloud</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/top-10-active-directory-tutorials-im-internet</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/der-unterschied-zwischen-jederalle-und-authentifizierten-benutzern</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/teams-neuigkeiten-26-10</loc><lastmod>2022-07-14</lastmod></url><url><loc>https://www.varonis.com/blog/entitlement-management</loc><lastmod>2025-06-12</lastmod></url><url><loc>https://www.varonis.com/coverage/mongodb</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis.com/blog/data-lifecycle-automation</loc><lastmod>2025-03-31</lastmod></url><url><loc>https://www.varonis.com/it/blog/google-cloud</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/blog/zendesk-sql-injection-and-access-flaws</loc><lastmod>2022-11-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/acesso-privilegiado-proteja-a-joia-da-coroa/</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/saiba-como-a-tecnologia-nac-pode-ajudar-a-combater-as-ameacas-ciberneticas</loc><lastmod>2022-08-16</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/azure-files</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/salesforce-ghost-sites</loc><lastmod>2023-09-15</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/estatisticas-e-tendencias-de-seguranca-cibernetica</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/blog/best-it-certifications</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/fr/blog/cookie-bite</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://www.varonis.com/it/blog/risks-of-url-rewriting</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://www.varonis.com/blog/koadic-pen-testing-pivoting-javascripting-part-ii</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/krack-attacke-was-sie-jetzt-wissen-mussen</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/customer-stories/data-security-posture-management-wins</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/blog/sql-server-best-practices-in-virtualized-environments</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/fr/platform/data-discovery-and-classification</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/blog/salesloft-drift-breach-and-saas-risk</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-varonis-helps-schools-secure-data</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://www.varonis.com/blog/adventures-malware-free-hacking-part-ii</loc><lastmod>2021-09-24</lastmod></url><url><loc>https://www.varonis.com/de/blog/chatgpt-dlp-what-enterprises-need-to-know</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/what-is-mddr</loc><lastmod>2024-06-07</lastmod></url><url><loc>https://www.varonis.com/es/blog/amazon-redshift</loc><lastmod>2024-07-05</lastmod></url><url><loc>https://www.varonis.com/blog/packet-capture</loc><lastmod>2023-04-06</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/controle-de-acesso-e-uso-dos-dados-vai-ser-fundamental-para-atender-regras-do-lgpd</loc><lastmod>2021-06-22</lastmod></url><url><loc>https://www.varonis.com/de/partners/partner-program</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-3-rats-und-reverse-shells</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/blog/data-breach-definition-by-state</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/fr/blog/salesforce-ghost-sites</loc><lastmod>2024-08-19</lastmod></url><url><loc>https://www.varonis.com/blog/market-leading-salesforce-security</loc><lastmod>2025-03-11</lastmod></url><url><loc>https://www.varonis.com/blog/pac_requestor-and-golden-ticket-attacks</loc><lastmod>2022-09-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/windows-powershell-vs-cmd-was-ist-der-unterschied</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/globaler-hersteller-verlasst-sich-bei-der-migration-in-die-cloud-auf-varonis</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/okta-attack-vectors</loc><lastmod>2024-02-23</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-january-2025</loc><lastmod>2025-01-30</lastmod></url><url><loc>https://www.varonis.com/blog/understanding-malware-free-hacking-part</loc><lastmod>2022-02-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vetores-de-ataque-okta</loc><lastmod>2023-03-27</lastmod></url><url><loc>https://www.varonis.com/blog/active-directory-account-lockout</loc><lastmod>2022-03-17</lastmod></url><url><loc>https://www.varonis.com/it/blog/microsoft-copilot-365-security</loc><lastmod>2024-11-05</lastmod></url><url><loc>https://www.varonis.com/it/platform/email-data-protection</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/es/blog/aws-remediation</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/fr/blog/differences-virus-ver</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/de/blog/wir-stellen-varonis-edge-vor-bis-zum-perimeter-und-weiter</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-find-active-directory-group-member</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/incursion-dans-le-piratage-sans-malware-partie-iv</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-rethinking-traditional-cybersecurity-principles-with-rick-howard</loc><lastmod>2024-03-25</lastmod></url><url><loc>https://www.varonis.com/blog/gigaom-radar-leader-for-data-security-platform</loc><lastmod>2025-01-21</lastmod></url><url><loc>https://www.varonis.com/de/coverage/azure</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/coverage/chatgpt-enterprise</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/whats-new-in-varonis-september-2024</loc><lastmod>2024-10-11</lastmod></url><url><loc>https://www.varonis.com/blog/risks-renaming-your-domain-in-active-directory</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/anatomy-of-a-ransomware-attack</loc><lastmod>2023-06-16</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/por-que-o-uba-detecta-ataques-de-zero-day-e-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/gdpr-privacy-policy</loc><lastmod>2022-10-14</lastmod></url><url><loc>https://www.varonis.com/de/blog/spiderman-phishing-kit</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://www.varonis.com/de/blog/saas-datenrisiko-report-zeigt-die-risiken-der-cloud</loc><lastmod>2023-01-20</lastmod></url><url><loc>https://www.varonis.com/de/blog/best-practices-fur-sql-server-teil-1-konfiguration</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/blog/unpacking-gen-ai-with-yohan-kim</loc><lastmod>2024-09-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/como-lidar-com-as-questoes-legais-relacionadas-a-um-ataque-ransomware</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/dns-ttl</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/fr/blog/detection-des-acces-aux-honeypots-avec-varonis</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/as-novas-tend%C3%AAncias-de-seguran%C3%A7a-do-per%C3%ADmetro</loc><lastmod>2022-03-12</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/executivos-e-profissionais-de-seguranca-cibernetica-entendem-os-perigos-das-maiores-ameacas-da-atualidade/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/blog/how-to-use-powershell-for-privilege-escalation-with-local-computer-accounts</loc><lastmod>2022-03-03</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/varonis-ganha-premio-de-melhor-solucao-de-seguranca-do-ano</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/wie-entwickelt-sich-big-data-uber-die-zeit</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/ihr-postfach-ist-fast-voll-2</loc><lastmod>2022-07-28</lastmod></url><url><loc>https://www.varonis.com/de/blog/how-to-prepare-for-a-salesforce-permissions-audit</loc><lastmod>2022-10-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/what-is-a-proxy-server</loc><lastmod>2022-04-07</lastmod></url><url><loc>https://www.varonis.com/fr/blog/comment-mieux-structurer-la-securite-daws-s3</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/kosten-fur-verstose-sind-hoch-warum-fragen-sie</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/how-has-ransomware-impacted-the-us-government</loc><lastmod>2023-05-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/how-to-protect-your-cloud-environment-from-todays-top-5-threats</loc><lastmod>2025-02-24</lastmod></url><url><loc>https://www.varonis.com/blog/shadow-ai</loc><lastmod>2025-06-30</lastmod></url><url><loc>https://www.varonis.com/es/platform/dspm</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/es/coverage/salesforce-agentforce</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/sua-maior-ameaca-a-seguranca-pode-estar-dentro-da-sua-empresa</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/powershell-obfuscation-stealth-through-confusion-part-i</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://www.varonis.com/it/coverage/iaas</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://www.varonis.com/platform/email-data-protection</loc><lastmod>2026-03-18</lastmod></url><url><loc>https://www.varonis.com/fr/blog/dataanywhere-transforme-les-fichiers-partages-en-fichiers-dropbox-securises-pour-les-entreprises</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/ids-vs-ips-qual-a-diferenca/</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/a-guide-to-ai-data-security</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/pt-br/</loc><lastmod>2026-03-26</lastmod></url><url><loc>https://www.varonis.com/fr/blog/artificial-intelligence-security</loc><lastmod>2023-11-07</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/principais-tendencias-de-seguranca-para-2018</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/cism-vs-cissp</loc><lastmod>2022-02-24</lastmod></url><url><loc>https://www.varonis.com/de/partners/service-providers</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/resoudre-les-blocages-active-directory-comment-detecter-les-applis-aux-id-et-mots-de-passe-perimes</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/fr/coverage/windows-file-shares-and-nas</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-10-besten-powershell-tutorials-im-internet</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/fr/blog/navigation-anonyme</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/content-library</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-ha-de-novo-na-varonis-segundo-semestre-2023</loc><lastmod>2023-08-29</lastmod></url><url><loc>https://www.varonis.com/donate</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://www.varonis.com/blog/the-difference-between-bash-and-powershell</loc><lastmod>2022-06-30</lastmod></url><url><loc>https://www.varonis.com/it/coverage/databricks</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/o-que-e-preciso-para-ser-um-hacker-etico</loc><lastmod>2021-06-21</lastmod></url><url><loc>https://www.varonis.com/blog/procmon</loc><lastmod>2021-11-03</lastmod></url><url><loc>https://www.varonis.com/blog/varonis-gigaoms-2023-radar-report</loc><lastmod>2024-01-16</lastmod></url><url><loc>https://www.varonis.com/blog/nist-800-53</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://www.varonis.com/blog/what-is-osint</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/fr/search-results</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/varonis-adds-secrets-discovery</loc><lastmod>2022-10-10</lastmod></url><url><loc>https://www.varonis.com/blog/speed-data-the-importance-of-asking-for-help-with-michelle-griffey</loc><lastmod>2024-12-19</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ingenierie-sociale-dans-lentreprise</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/vulnerabilidade-de-dia-zero-explicada</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/it/blog/aws-remediation</loc><lastmod>2024-06-27</lastmod></url><url><loc>https://www.varonis.com/fr/blog/qui-tente-dacceder-a-vos-donnees</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/mantenha-seus-funcionarios-seguros-em-qualquer-lugar</loc><lastmod>2023-12-01</lastmod></url><url><loc>https://www.varonis.com/blog/azure-bicep</loc><lastmod>2022-06-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/undichte-server-in-neuseeland-zeigen-notwendigkeit-fur-management-und-schutz-von-informationen</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/tendencias-que-estao-tirando-o-sono-dos-cisos-chief-information-security-officer</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://www.varonis.com/it/blog/databricks</loc><lastmod>2024-12-06</lastmod></url><url><loc>https://www.varonis.com/fr/blog/56-statistiques-sur-les-violations-de-donnees-pour-preparer-2020</loc><lastmod>2022-08-11</lastmod></url><url><loc>https://www.varonis.com/de/blog/penetrationstests-teil-2-rats</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/coverage/windows-file-shares-and-nas</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://www.varonis.com/blog/2026-cybercrime-trends</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://www.varonis.com/de/blog/die-sicherheitsbedrohungen-kommen-von-innen</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/de/blog/gartner-ai-powered-phishing</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.varonis.com/de/blog/varonis-datenschutzplattform-im-gartner-2017-market-guide-fur-datenzentrische-audit-und-schutzlosungen-gelistet</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://www.varonis.com/fr/blog/identifier-les-ransomware-notre-nouvel-outil-didentification</loc><lastmod>2022-08-25</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/construa-uma-cultura-de-seguranca-da-informacao</loc><lastmod>2023-11-30</lastmod></url><url><loc>https://www.varonis.com/de/blog/analyse-des-nutzerverhaltens-was-ist-damit-genau-gemeint</loc><lastmod>2021-10-28</lastmod></url><url><loc>https://www.varonis.com/blog/levels-of-data-protection-by-brian-vecci</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/nos-sabemos-sobre-os-dados-da-sua-empresa/</loc><lastmod>2021-06-23</lastmod></url><url><loc>https://www.varonis.com/pt-br/blog/deteccao-e-resposta-em-endpoint-edr-tudo-o-que-voce-precisa-saber</loc><lastmod>2021-06-28</lastmod></url><url><loc>https://www.varonis.com/fr/blog/detection-de-codes-malveillants-dans-les-metadonnees-des-documents-office</loc><lastmod>2021-10-29</lastmod></url><url><loc>https://www.varonis.com/de/blog/supercharging-threat-detection-with-agentic-ai</loc><lastmod>2025-05-06</lastmod></url><url><loc>https://www.varonis.com/de/blog/leitfaden-fur-den-gruppenrichtlinien-editor-konfigurieren-und-verwenden</loc><lastmod>2023-06-30</lastmod></url><url><loc>https://www.varonis.com/fr/blog/ransomware-targets-aws-s3-buckets</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://www.varonis.com/de/blog/three-ways-varonis-helps-fight-insider-threats</loc><lastmod>2023-11-14</lastmod></url></urlset>