Featured
Featured
Varonis Accelerates the Secure Adoption of Microsoft Copilot for Microsoft 365
Rob Sobers
Jan 23, 2024
Featured
Varonis Products
What’s new in Varonis: Jan 2024
Yumna Moazzam
Jan 31, 2024
Try Varonis free.
Get a detailed data risk report based on your company’s data. Deploys in minutes.
Featured collections
Latest articles
See all articles
DSPM Report Highlights Risks That Lead to Significant Data Breaches
Shane Walsh
February 14, 2024
Varonis' new DSPM report reveals that typical companies are widening their blast radius by oversharing permissions, excess ghost users, lack of MFA, and more.
Speed Data: Thinking From a Cyberattacker's Perspective With Dalal Alharthi
Megan Garza
February 13, 2024
Dr. Dalal Alharthi talks about the importance of organizations anticipating a breach and seeing the world through the eyes of an attacker.
Data Security
See all Data Security
DSPM Report Highlights Risks That Lead to Significant Data Breaches
Shane Walsh
February 14, 2024
Varonis' new DSPM report reveals that typical companies are widening their blast radius by oversharing permissions, excess ghost users, lack of MFA, and more.
Speed Data: Thinking From a Cyberattacker's Perspective With Dalal Alharthi
Megan Garza
February 13, 2024
Dr. Dalal Alharthi talks about the importance of organizations anticipating a breach and seeing the world through the eyes of an attacker.
Behind the Varonis Rebrand
Courtney Bernard
February 12, 2024
Discover the strategy behind Varonis' rebrand that involved a full transition to a hero archetype and the introduction of Protector 22814.
Speed Data: Hiring the Right Cybersecurity Professionals With Leah McLean
Megan Garza
February 1, 2024
Cofounder of the nonprofit Whole Cyber Human Initiative, Leah McLean, shares her advice for recruiting teams looking for cybersecurity superstars and why it’s so important for women to have representation in tech.
Threat Research
See all Threat Research
Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes
Dolev Taler
January 18, 2024
Varonis Threat Labs discovered a new Outlook exploit and three new ways to access NTLM v2 hashed passwords.
Taking Microsoft Office by "Storm"
Jason Hill
July 18, 2023
The “Storm-0978” ransomware group is actively exploiting an unpatched Microsoft Office and Windows HTML remote code execution vulnerability.
Varonis Products
See all Varonis Products
Automatically Remove Salesforce Public Links with Varonis
Nathan Coppinger
February 6, 2024
Varonis’ least privilege automation capabilities now remove public Salesforce links automatically.
Varonis Delivers Market-leading Salesforce Security
Avia Navickas
February 6, 2024
Varonis delivers market-leading Salesforce security
Featured videos
Webinar
State of Cybercrime: China's Silent Cyber Campaigns
Webinar
Data-First Forum: The Path to CISO
Video
The Varonis Data Security Platform
Cloud Security
See all Cloud Security
Varonis Accelerates the Secure Adoption of Microsoft Copilot for Microsoft 365
Rob Sobers
January 23, 2024
Varonis and Microsoft forged a new strategic collaboration to help organizations safely harness one of the most powerful productivity tools on the planet — Microsoft Copilot for Microsoft 365.
Is Your Org Ready for Microsoft Copilot?
Brian Vecci
December 12, 2023
Enjoy this step-by-step guide showing you how to deploy generative AI tools safely with Varonis.
Ransomware
See all Ransomware
Speed Data: The Commoditization of Cybercrime With Matt Radolec
Megan Garza
June 21, 2023
Matt Radolec at Varonis discusses the future of cybersecurity, the rise of ransomware-as-a-service (RaaS), and what security risks keep him up at night.
Four Must-Know Cyber Tips for Your Business
Yaki Faitelson
December 1, 2022
The real story behind today’s breaches is never about an isolated bad decision—it’s about the many decisions made long before a sleepy network administrator gets a call from an attacker.
Explore our resources.
The Great SaaS Data Exposure
How Varonis Helped a US Casino and Hotel Stop a Cyberattack within 30 Minutes
Fighting a Different Battle: Varonis' Unique Approach to Cybersecurity
Case Study
How Varonis Helps a One-Person Security Team Save Over 400 Hours Annually
Why Varonis SaaS?
Active Directory
See all Active Directory
Azure Managed Identities: Complete Guide with Free Demonstration
Neeraj Kumar
October 6, 2022
Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.
Group Policy Objects (GPOs): How They Work & Configuration Steps
David Harrington
June 15, 2022
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
Privacy & Compliance
See all Privacy & Compliance
Speed Data: The Principles of GRC With Hannah DeWane
Megan Garza
January 4, 2024
Hannah DeWane at Varonis shares her day-to-day world of security audits and the wonderful world of risk management.
Cybersecurity Maturation Model Certification 2.0: How Varonis Ensures Certification for Defense Contractors
Shane Walsh
October 5, 2023
Varonis can help you achieve compliance and implement the Cybersecurity Maturity Model Certification 2.0 (CMMC) program to safeguard cybersecurity across the government’s DIB.
We're Varonis.
Our mission is to deliver meaningful security outcomes on autopilot.
No overhead. Just outcomes.
No overhead. Just outcomes.