Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More

How to Use Azure Sentinel for Security Analytics and Threat Intelligence

Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the...

Read More

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

5 Data Governance Reports for Data Owners

This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...

Read More

Threat Update 35 – Healthcare Data at Risk

COVID-19 provided fertile ground for attackers to sow confusion and take advantage of healthcare organizations on the front lines. From hospitals triaging patients around the clock to pharmaceutical companies developing...

Read More

Employee Data Theft Definition, Examples and Prevention Tips

Not all attacks come from external threats. With frightening frequency, insider threats and employee data theft have hit organizations, stealing data, important IP, and putting the organization at risk. There...

Read More

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...

Read More

How Varonis Limits Organization-Wide Exposure

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

Read More

Endpoint Detection and Response: All You Need to Know About EDR Security

Endpoints – the laptops, smartphones, and other devices we use on a daily basis – are a favorite target of attackers. They’re everywhere, prone to security vulnerabilities, and difficult to...

Read More

Threat Update 32 – Lemon Duck Floats on Exchange ProxyLogon Vulnerability

What’s better than cryptocurrency? FREE cryptocurrency, right? Not if you’re one of the many victims of the Lemon Duck cryptomining botnet who is footing the bill for the “free” (to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.