All Posts
![](https://info.varonis.com/hubfs/Newsletter_BlogHeader%20July.png)
What's New in Varonis: July 2024
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jul 25, 2024
Learn more about Varonis’ New NoSQL database support and expanded Salesforce exposure remediations.
![Megan Garza and Jonathan Rau](https://info.varonis.com/hubfs/Jonathan%20Rau%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: AWS, Gen AI, and SecDataOps With Jonathan Rau
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jul 22, 2024
The VP and Distinguished Engineer at Query explains what most organizations get wrong about cloud security.
![Crowdstrike blue screen recovery steps](https://info.varonis.com/hubfs/Blog_Crowdstrike_202407_V1_Opt2.png)
CrowdStrike Blue Screen Recovery Steps
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Jul 19, 2024
Updates and recovery steps for the Windows blue screen of death (BSOD) issue currently affecting devices and VMs running CrowdStrike Falcon Sensor.
![Remote Management Tools](https://info.varonis.com/hubfs/Blog_RMMTools_202407_FNL.png)
The Power and Peril of RMM Tools
![Tom Barnea](https://info.varonis.com/hubfs/Tom.png)
Jul 18, 2024
Discover real-world examples of remote monitoring and management (RMM) tool exploits and how to protect your organization from these attacks.
![](https://info.varonis.com/hubfs/Blog_VaronisMicrosoft_202403_FNL.png)
Varonis Accelerates the Secure Adoption of Microsoft Copilot for Microsoft 365
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Jul 09, 2024
Varonis and Microsoft forged a new strategic collaboration to help organizations safely harness one of the most powerful productivity tools on the planet — Microsoft Copilot for Microsoft 365.
![Megan Garza and Jon Densmore](https://info.varonis.com/hubfs/Jon%20Densmore%20Speed%20Data%20-%20Blog%20hero-1.png)
Speed Data: Tips for Safeguarding Sensitive Data With Jon Densmore
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jul 09, 2024
Jon Densmore, the CISO for First Mutual Holding Company, shares the best way to prepare for a breach.
![Copilot pop-up box that says](https://info.varonis.com/hubfs/Blog_EinsteinCopilot_BlogHero_202403_V2.png)
Salesforce Einstein Copilot: Boosting Productivity With a Focus on Security
![Tomer Ronen](https://info.varonis.com/hubfs/Tomer%20Ronen.png)
Jul 03, 2024
AI tools like Salesforce Einstein Copilot can improve efficiency, but also increase risk. Check out these tips on preparing for a Copilot rollout.
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTLHero.png)
OpenSSH 'RegreSSHion' RCE Vulnerability
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Jul 02, 2024
A critical vulnerability in OpenSSH's server, dubbed 'regreSSHion,' raises the risk of remote code execution with root privileges.
![Scanning your security posture before deploying gen AI tools like Copilot for Microsoft 365 is a crucial first step.](https://info.varonis.com/hubfs/Blog_CopilotSecurityScan_BlogHero_202406_FNL.png)
Why Your Org Needs a Copilot Security Scan Before Deploying AI Tools
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Jun 28, 2024
Assessing your security posture before deploying gen AI tools like Copilot for Microsoft 365 is a crucial first step.
![FedRAMP In Process](https://info.varonis.com/hubfs/Blog_FedRAMPAnnouncement_BlogHero_202404_FNL.png)
Varonis Achieves "In Process" Status for FedRAMP® Authorization
![Michael J. Wallace](https://info.varonis.com/hubfs/Imported%20images/mike-wallace.jpeg)
Jun 27, 2024
Varonis announces "in process" status for FedRAMP® authorization, continuing to provide robust data security solutions for agencies and public-sector organizations nationwide.
![](https://info.varonis.com/hubfs/Blog_Webhooks_BlogHero_202406_FNL.png)
Integrate Data-Centric Insights Into Your Security Workflows Using Webhooks
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 27, 2024
Use webhooks to easily integrate Varonis’ unique, data-centric insights into your security stack to consolidate monitoring and enhance security workflows.
![](https://info.varonis.com/hubfs/Copy%20of%20ProductNewsletter_BlogHeader%20%281%29-1.png)
What’s new in Varonis: June 2024
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 27, 2024
This month, we released new updates designed to help you accelerate security workflows, automate your DSPM efforts, and manage shadow databases.
![Megan Garza and Rachel Beard](https://info.varonis.com/hubfs/Rachel%20Beard%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: The (Non)Malicious Insider With Rachel Beard
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 26, 2024
Salesforce's Rachel Beard discusses why insider threats may not always have ill intentions and why security in the CRM is crucial.
![disable Salesforce public links](https://info.varonis.com/hubfs/Blog_SFRemediatePublicLink_202406_FNL.png)
Protecting Salesforce: Preventing Public Link Creation
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 25, 2024
Identify and prevent the creation of Salesforce public links and reduce your blast radius with Varonis.
![Without automation, cloud data security doesn't stand a chance.](https://info.varonis.com/hubfs/Blog_AutomatedDSPM_202406_V1.png)
Cloud Security Essentials: The Case for Automated DSPM
![Nolan Necoechea](https://info.varonis.com/hubfs/Necoechea_Passport_3193LO_BW.jpg)
Jun 21, 2024
Data security posture management (DSPM) has emerged as a standard for securing sensitive data in the cloud and other environments. However, without automation, DSPM doesn’t stand a chance. Automation is crucial to overcoming the challenges of securing data in the cloud.
![](https://info.varonis.com/hubfs/Blog_AWSRedshift_BlogHero_202406_FNL.png)
Varonis’ Expands Database Support to Amazon Redshift
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 12, 2024
Varonis for AWS now supports Amazon Redshift, enabling organizations to ensure their critical data warehouses are secure.
![AWS Remediation](https://info.varonis.com/hubfs/Blog_AWSReinventAnnouncement_BlogHero_202406_FNL.png)
Varonis Adds Automated Remediation for AWS to Industry-Leading DSPM Capabilities
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 12, 2024
New automation remediates public exposure and removes stale users, roles, and access keys in AWS, cementing Varonis as the only Data Security Platform with active DSPM capabilities.
![](https://info.varonis.com/hubfs/Blog_ShadowDatabaseDiscovery_BlogHero_202404.png)
Discover Shadow Databases With Varonis’ Industry-Leading DSPM
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 12, 2024
Varonis now enables organizations to close significant security gaps by discovering and remediating “shadow” databases across AWS environments.
![Megan Garza and Terry Inns](https://info.varonis.com/hubfs/Terry%20Inns%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: Why Your Team is Your Greatest Cybersecurity Tool With Terry Inns
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 11, 2024
The Group Director of Operations Support for Jacobs shares his insights based on years of experience in the field.
![keyboard showing AI trying to access a shield to represent data security](https://info.varonis.com/hubfs/Blog_GenerativeAISecurity_BlogHero_202404_V1.png)
A Practical Guide to Safely Deploying Gen AI
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 06, 2024
Varonis and Jeff Pollard, Forrester Security and Risk Analyst, share insights into how to securely integrate generative AI into your organization.
![](https://info.varonis.com/hubfs/Blog_GartnerTopVendor_BlogHero_202406_FNL%20%281%29.png)
Varonis Recognized as Gartner’s Customers’ Choice in DSPM
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Jun 05, 2024
Varonis leads the DSPM market with more reviews than any other vendor, more verified five-star ratings, and the highest overall product score.
![](https://info.varonis.com/hubfs/Snowflake_BreakingNews_BlogHero_V2.png)
Targeted Campaign Against Snowflake Customers: What You Need to Know
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Jun 04, 2024
Recent data breaches of prominent Snowflake cloud customers highlight the risks of compromised cloud storage accounts.
![DSPM radar of visibility](https://info.varonis.com/hubfs/Graphic%20depicting%20ring%20of%20protection%20around%20data.png)
What is Data Security Posture Management (DSPM)?
![Nolan Necoechea](https://info.varonis.com/hubfs/Necoechea_Passport_3193LO_BW.jpg)
May 31, 2024
Learn what data security posture management (DSPM) is and isn't, why it’s important, how it works, and how to evaluate DSPM solutions.
![data protection in age of AI](https://info.varonis.com/hubfs/Blog_GenerativeAISecurity_BlogHero_202404_V1.png)
How to Prevent Your First AI Data Breach
![Nolan Necoechea](https://info.varonis.com/hubfs/Necoechea_Passport_3193LO_BW.jpg)
May 30, 2024
Learn how the broad use of gen AI copilots will inevitably increase data breaches, which Varonis' Matt Radolec shared in an RSA Conference 2024 Keynote session.
![](https://info.varonis.com/hubfs/Copy%20of%20ProductNewsletter_BlogHeader%20%281%29.png)
What's New in Varonis: May 2024
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
May 30, 2024
Varonis brings a UI refresh, easier policy management, expanded automated remediation capabilities in AWS, automation rollback, and privacy automation.
![Megan Garza and Robert](https://info.varonis.com/hubfs/Bob%20Blythe%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: Exploring the Virtual CISO Role With Robert Blythe
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
May 29, 2024
Bob Blythe talks about the virtual CISO market, gen AI, and where the future of tech is headed.
![graduation cap for schools with Varonis branding, data security](https://info.varonis.com/hubfs/Blog_HowVaronisSecuresSchoolData_202405_FNL.png)
How Varonis Helps Schools Secure Data
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
May 24, 2024
K–12 schools, school districts, and universities rely on Varonis to combat threat actors, prevent breaches, and continuously improve their data security posture.
![CRN Women of the Channel at Varonis](https://info.varonis.com/hubfs/Blog_CRNWomenoftheChannel_202405_V1.png)
Varonis Leaders Shine as CRN’s Women of the Channel
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
May 15, 2024
The leading source for channel news honored three Varonis team members.
![Megan Garza and Alexis Bonnell](https://info.varonis.com/hubfs/Alexis%20Bonnell%20-%20Speed%20Data%20Blog%20hero.png)
Speed Data: Developing ‘Security as a Service’ With Alexis Bonnell
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
May 14, 2024
Alexis Bonnell, CIO for the U.S. Air Force Research Laboratory, shares her thoughts on the relationship between knowledge and AI.
![Comparing passive DSPM solutions to active ones](https://info.varonis.com/hubfs/Blog_NotAllDSPMsAreEqual_BlogHero_202404_FNL.png)
The Future of Cloud Data Security: Doing More With DSPM
![Mike Thompson](https://info.varonis.com/hubfs/MikeThompson_BW.jpg)
May 09, 2024
Learn what you need to be aware of when evaluating a DSPM solution, why IaaS automation is crucial, and how you can prepare your org for the future of DSPM.
![](https://info.varonis.com/hubfs/Blog_VaronisforCopilot_202403_V1.png)
Introducing Varonis for Microsoft 365 Copilot
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
May 07, 2024
Varonis for Microsoft 365 Copilot is the industry's first purpose-built cybersecurity solution to secure Microsoft’s AI-powered productivity tool before and after deployment.
![Dropx Sign Data Breach](https://info.varonis.com/hubfs/Blog_VTL-DropboxSign_BlogHero_202405_V1.png)
Dropbox Sign Data Breach: What You Need to Know
![Omri Marom](https://info.varonis.com/hubfs/OmriMarom.png)
May 03, 2024
Dropbox Sign's recent data breach highlights how non-human identities are driving more profound breaches.
![Magnify glass looks at sensitive information and reveals PHI data](https://info.varonis.com/hubfs/Blog_DataDiscoveryandClassification_202404_FNL.png)
Data Classification Buyer's Guide: How To Choose a Data Classification Solution
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 30, 2024
Understand the different data classification offerings available, why traditional efforts fail, and what top 5 elements to consider when choosing a vendor.
![What's New in Varonis: April edition](https://info.varonis.com/hubfs/ProductNewsletter_BlogHeader_April.png)
What's New in Varonis: April 2024
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Apr 30, 2024
Learn more about Varonis for Microsoft 365 Copilot, new security posture reporting, and more about our new MDDR service.
![Megan Garza and Doug Merrett](https://info.varonis.com/hubfs/Doug%20Merrett%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: Security Leaders, Salesforce, and Social Consciousness With Doug Merrett
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 23, 2024
Doug Merrett of Platinum7 shares his thoughts on the importance of education, philanthropy, and realistic expectations in the tech world.
![Hourglass with Copilot for Microsoft 365 logo](https://info.varonis.com/hubfs/Blog_TheROIofM365Copilot_BlogHero_202404_FNL.png)
Is Microsoft Copilot Worth the Investment?
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 18, 2024
Is Microsoft Copilot worth the investment? Varonis experts weigh in on the ROI of the powerful generative AI tool based on Forrester Research's latest study.
![stop configuration drift with Varonis](https://info.varonis.com/hubfs/Blog_ManageConfigurationDrift_BlogHero_202404%20_FNL.png)
Stop Configuration Drift With Varonis
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Apr 16, 2024
Stop configuration drift in your environment with Varonis' automated data security posture management platform.
![PAN-OS Zero-Day Active Exploit](https://info.varonis.com/hubfs/PAN-OS%20Zero-Day%20Breaking%20News%20Blog%20Hero.png)
Palo Alto Networks PAN-OS Zero-Day Active Exploit: What You Need to Know
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Apr 12, 2024
Palo Alto Networks issued a warning on April 12, 2024, that a critical, unpatched vulnerability in their PAN-OS firewall is being actively exploited.
![](https://info.varonis.com/hubfs/Copy%20of%20TEMPORARY%20Breaking%20News%20Blog%20Hero%20%281%29.png)
Sisense Data Breach: What You Need to Know
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Apr 11, 2024
The U.S. Cybersecurity and Infrastructure Agency (CISA) issued an alert this week warning Sisense customers of a data breach. Here's what you need to know.
![shield of data integrity](https://info.varonis.com/hubfs/Blog_DataIntegrity_BlogHero_202404_FNL.png)
Ensuring Data Integrity in the Age of AI: How State and Local Governments Can Protect Their Data
![Brian Vecci](https://info.varonis.com/hubfs/brian-vecci.jpg)
Apr 09, 2024
Varonis Field CTO Brian Vecci chats about enhancing digital integrity for state and local governments in the age of AI.
![Megan Garza and Bryan Chnowski](https://info.varonis.com/hubfs/Bryan%20Chnowski%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: Combating the Cybersecurity Skills Shortage With Bryan Chnowski
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 09, 2024
Bryan Chnowski, Deputy CISO for Nuvance Health, explains why one of the most significant cybersecurity risks on the horizon is the shortage of workers.
![hand tries accessing SharePoint files](https://info.varonis.com/hubfs/Blog_VTL-DataExfiltrationinSharepoint_202403_FNL.png)
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
![Eric Saraga](https://info.varonis.com/hubfs/eric-saraga-1.jpg)
Apr 09, 2024
Varonis Threat Labs discovered two techniques in SharePoint that allow users to circumvent audit logs and avoid triggering download events while exfiltrating files.
![](https://info.varonis.com/hubfs/Blog_VTL-XZUtil_202404_V1.png)
XZ Backdoor: Supply Chain Jump Scare
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Apr 05, 2024
While the XZ backdoor is scary, most companies learned from SolarWinds
![Know Before You Go: RSA Conference 2024](https://info.varonis.com/hubfs/Blog_ConferenceBlogHero_202403_FNL.png)
Know Before You Go: Your Guide to RSAC 2024
![Kilian Englert](https://info.varonis.com/hubfs/Varonis_June2021/Images/killian-englert-200x200.jpg)
Apr 03, 2024
Discover what sessions, events, and activities should be added to your RSA Conference 2024 agenda.
![Megan Garza and Mark Bruns](https://info.varonis.com/hubfs/Mark%20Bruns%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: The Benefits of Simplicity With Mark Bruns
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Mar 29, 2024
CISO Mark Burns shares cybersecurity knowledge amassed over 25 years, the pros and cons of gen AI, how to protect data, and why compromise is key.
![What's new in Varonis for March 2024](https://info.varonis.com/hubfs/March_%20ProductNewsletter_BlogHeader.png)
What's New in Varonis: March 2024
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Mar 28, 2024
Varonis unveiled updates designed to help you detect and investigate threats, improve your Salesforce and Azure security posture, and streamline your data discovery requests.
![Managed Data Detection and Response with Varonis](https://info.varonis.com/hubfs/Blog_WhatisMDDR_BlogHero_202402_V3.2.png)
What is Managed Data Detection and Response (MDDR)?
![Mike Thompson](https://info.varonis.com/hubfs/MikeThompson_BW.jpg)
Mar 26, 2024
XDR and MDR offerings are threat-focused and leave you data-blind. Varonis MDDR helps mitigate complex threats to your most valuable asset: data.
![hand coming out of Invanti logo to symbolize threat actor](https://info.varonis.com/hubfs/Blog_VTL-Ivanti_202403_V1.2.png)
Increased Threat Activity Targeting Ivanti Vulnerabilities
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Mar 20, 2024
A recent surge in activity targeting Ivanti Connect Secure (ICS) involves chaining two vulnerabilities that give threat actors the ability to execute arbitrary commands remotely.
![Microsoft Copilot prompt exposing sensitive data](https://info.varonis.com/hubfs/Blog_Copilot_202403_V1.png)
6 Prompts You Don't Want Employees Putting in Copilot
![Brian Vecci](https://info.varonis.com/hubfs/brian-vecci.jpg)
Mar 15, 2024
Discover what simple prompts could expose your company’s sensitive data in Microsoft Copilot.
![Einstein Copilot data security with Varonis](https://info.varonis.com/hubfs/Blog_EinsteinCopilot_BlogHero_202403_V2.png)
Generative AI Security: Preparing for Salesforce Einstein Copilot
![Collaborative Article](https://info.varonis.com/hubfs/Varonis_Badge_150dpi_Black.png)
Mar 12, 2024
See how Salesforce Einstein Copilot’s security model works and the risks you must mitigate to ensure a safe and secure rollout.
![DSPM Dashboard from Varonis](https://info.varonis.com/hubfs/Blog_DSPM_BlogHero_202402_V1.png)
DSPM Buyer's Guide: How to Choose a DSPM Solution
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Mar 11, 2024
Understand the different types of DSPM solutions, avoid common pitfalls, and ask questions to ensure you purchase a data security solution that meets your unique requirements.
![Megan Garza and Ian Hill](https://info.varonis.com/hubfs/Ian%20Hill%20Speed%20Data%20-%20Blog%20hero.png)
Speed Data: Preparing for the Unknown in Cybersecurity With Ian Hill
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Mar 11, 2024
Ian Hill, the Director of Information and Cybersecurity for Upp Telecommunications, offers his take on AI and the future of tech, shares his tricks for a good cyber defense, and explains why the best-laid plans of mice and security professionals often go astray.
![](https://info.varonis.com/hubfs/Blog_SharedResponsibilityModel_BlogHero_202402_V2.png)
Understanding and Applying the Shared Responsibility Model at Your Organization
![Tristan Grush](https://info.varonis.com/hubfs/TristanGrush.jpg)
Mar 07, 2024
To avoid significant security gaps and risks to sensitive data, organizations need to understand the shared responsibility model used by many SaaS providers.
![shield cover cloud data, Varonis](https://info.varonis.com/hubfs/Blog_MDDR_BlogHero_202402_V1.2.png)
Varonis MDDR: Industry's First Managed Data Detection and Response Offering
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Mar 05, 2024
Varonis MDDR introduces a new 24x7x365 threat detection and response service built to stop data breaches.
![Megan Garza and David Ulloa](https://info.varonis.com/hubfs/David%20Ulloa%20blog%20header.png)
Speed Data: Film, Foodies, and the Future of Tech With David Ulloa
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Feb 27, 2024
Dr. David Ulloa, Chief Security Information Officer at IMC Companies, shares the best line of defense against a sophisticated threat actor.
![](https://info.varonis.com/hubfs/Feb_BlogHero.png)
What’s New in Varonis: Feb 2024
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Feb 26, 2024
Improve your data security posture management efforts with this month's updates to the Varonis Data Security Platform.
![Varonis logo and MarshMcLennan Agency logo](https://info.varonis.com/hubfs/Blog_MarshMcLennanAgency_202402_FNL.png)
Varonis joins Marsh McLennan Agency’s Cyber Resiliency Network
![Matt Radolec](https://info.varonis.com/hubfs/matt-radolec.jpg)
Feb 20, 2024
Varonis is teaming up with Marsh McLennan Agency. Together, we'll help organizations improve their cyber resilience with industry-leading DSPM solutions.
![](https://info.varonis.com/hubfs/Blog_ApexVulnerabilitiesinSalesforce_202401_FNL_V2.png)
Security Vulnerabilities in Apex Code Could Leak Salesforce Data
![Nitay Bachrach](https://info.varonis.com/hubfs/nitay-bachrach.jpg)
Feb 20, 2024
Varonis' threat researchers identified high- and critical-severity vulnerabilities in Apex, a programming language for customizing Salesforce instances.
![DSPM radar surfacing findings. Varonis also shows how to fix them.](https://info.varonis.com/hubfs/Blog_DSPM_BlogHero_202402_V1.png)
DSPM Report Highlights Risks That Lead to Significant Data Breaches
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Feb 14, 2024
Varonis' new DSPM report reveals that typical companies are widening their blast radius by oversharing permissions, excess ghost users, lack of MFA, and more.
![Megan Garza and Dalal Alharthi](https://info.varonis.com/hubfs/Dalal%20Alharthi_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Thinking From a Cyberattacker's Perspective With Dalal Alharthi
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Feb 13, 2024
Dr. Dalal Alharthi talks about the importance of organizations anticipating a breach and seeing the world through the eyes of an attacker.
![](https://info.varonis.com/hubfs/Blog_2024Branding_BlogHero_202402_FNL%20%281%29.png)
Behind the Varonis Rebrand
![Courtney Bernard](https://info.varonis.com/hubfs/Headshot_Cbernard.png)
Feb 12, 2024
Discover the strategy behind Varonis' rebrand that involved a full transition to a hero archetype and the introduction of Protector 22814.
![](https://info.varonis.com/hubfs/Blog_SalesforceLPA_202402_FNL-1.png)
Automatically Remove Salesforce Public Links with Varonis
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Feb 06, 2024
Varonis’ least privilege automation capabilities now remove public Salesforce links automatically.
![](https://info.varonis.com/hubfs/Blog_SalesforceLaunch_BlogHero_202204_FNL_01.png)
Varonis Delivers Market-leading Salesforce Security
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Feb 06, 2024
Varonis delivers market-leading Salesforce security
![Megan Garza and Leah McLean](https://info.varonis.com/hubfs/Leah%20McLean_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Hiring the Right Cybersecurity Professionals With Leah McLean
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Feb 01, 2024
Cofounder of the nonprofit Whole Cyber Human Initiative, Leah McLean, shares her advice for recruiting teams looking for cybersecurity superstars and why it’s so important for women to have representation in tech.
![](https://info.varonis.com/hubfs/Blog_ProductNewsletter_202401_V1.0.png)
What’s new in Varonis: Jan 2024
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Jan 31, 2024
This month brings you a fresh set of updates designed to improve your cybersecurity journey.
![](https://info.varonis.com/hubfs/Blog_UniversalDataConnector_BlogHero_202401_FNL.png)
Varonis Introduces Universal Classification Support for Databases
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jan 30, 2024
Integrate Varonis with virtually any network-connected database to discover and classify sensitive data at scale with pinpoint accuracy.
![](https://info.varonis.com/hubfs/Blog_SnowflakeIntegration_202401_FNL.png)
Varonis Expands Coverage to Help Secure Critical Snowflake Data
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jan 24, 2024
Varonis extends DSPM coverage to Snowflake, providing enhanced visibility and data security for critical Snowflake data.
![microsoft NTLM leaks](https://info.varonis.com/hubfs/Blog_VTL_NTLMV2_202401_FNL.png)
Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes
![Dolev Taler](https://info.varonis.com/hubfs/dolev-taler.jpg)
Jan 18, 2024
Varonis Threat Labs discovered a new Outlook exploit and three new ways to access NTLM v2 hashed passwords.
![Megan Garza and John Mason](https://info.varonis.com/hubfs/John%20Mason_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: When Lives Depend on Strong Security With John Mason
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jan 18, 2024
Tempo Technology Services' John Mason shares why strong cybersecurity in healthcare is so critical and how organizations can combat malicious actors.
![blue target graphic with cursor close to bullseye](https://info.varonis.com/hubfs/Blog_GigaOmRadarReport_BlogHero_202312_FNL.png)
Varonis Named a Leader in GigaOm’s 2023 Radar Report for Data Security Platforms
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jan 12, 2024
Varonis is proud to be named a Leader in GigaOm’s first-ever Radar Report for Data Security Platforms.
![Megan Garza and Hannah DeWane](https://info.varonis.com/hubfs/Hannah%20DeWane_Speed%20Data%20Blog%20Hero%20%282%29.jpg)
Speed Data: The Principles of GRC With Hannah DeWane
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jan 04, 2024
Hannah DeWane at Varonis shares her day-to-day world of security audits and the wonderful world of risk management.
![radar with a DSPM dashboard](https://info.varonis.com/hubfs/Blog_DebunkingDSPMMyths_202309_FNL.png)
2024 Cybersecurity Trends: What You Need to Know
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Dec 26, 2023
Learn more about data security posture management, AI security risks, compliance changes, and more to prepare your 2024 cybersecurity strategy.
![](https://info.varonis.com/hubfs/Blog_WhatsNewInDecember_BlogHero_202312_FNL%20%281%29.png)
What’s new in Varonis: December 2023
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Dec 19, 2023
This month brings you several new features to help security teams manage and secure their critical cloud data.
![shield of cybersecurity leaders](https://info.varonis.com/hubfs/Blog_CISOAdvicefromSpeedData_BlogHero_20231_FNL.png)
Straight From the CISO: Top Tips for Today's Cybersecurity Leaders
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Dec 14, 2023
We’ve gained massive insight from our conversations with CISOs and other cybersecurity leaders. Now, we're passing along their wisdom to you.
![](https://info.varonis.com/hubfs/Blog_SalesforceAppExchange_202310_FNL%20%281%29.png)
Varonis Joins Salesforce AppExchange
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Dec 14, 2023
The Varonis Data Security Platform can now be found on the Salesforce AppExchange
![scales with a data protection shield](https://info.varonis.com/hubfs/Blog/Graphics%20and%20Heroes/Blog_USPrivacyLaws_BlogHero_202208_FNL.png)
Navigating the Complex Landscape of Data Protection in the Federal Sector
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Dec 13, 2023
Varonis' Justin Wilkins and Trevor Brenn highlight the importance of data security for the federal sector, the risks of gen AI, and more.
![Copilot logo showing how it can pull from PII labeled data](https://info.varonis.com/hubfs/Blog_IsYourOrgMicrosoftCopilotReady_BlogHero_202311_FNL.png)
Is Your Org Ready for Microsoft Copilot?
![Brian Vecci](https://info.varonis.com/hubfs/brian-vecci.jpg)
Dec 12, 2023
Enjoy this step-by-step guide showing you how to deploy generative AI tools safely with Varonis.
![](https://info.varonis.com/hubfs/Blog_IaaS-AzureBlob-AWSDatabases_BlogHero_202311_FNL.png)
Varonis Expands DSPM Capabilities with Deeper Azure and AWS Support
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Dec 05, 2023
Varonis is expanding its IaaS coverage to AWS databases and Azure Blob Storage, strengthening the CSPM and DSPM pillars of our Data Security Platform.
![Megan Garza and Mark Weber](https://info.varonis.com/hubfs/Mark%20Weber_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: The Next Generation of Cybersecurity With Mark Weber
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Nov 21, 2023
Executive in Residence for the Catholic University of America Mark Weber shares tips for mentoring future cybersecurity professionals.
![Exchange Online image showing data regulations being monitored](https://info.varonis.com/hubfs/Blog_ProductNewsletter_202311_V1.0.png)
How Varonis Helps With Email Security
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Nov 20, 2023
Discover how you can proactively reduce your email attack surface, stop data exfiltration, and curb gen AI risk with accurate and automated email security.
![Varonis Athena AI](https://info.varonis.com/hubfs/Blog_VaronisAI_BlogHero_202311_FNL.png)
Varonis Introduces Athena AI to Transform Data Security and Incident Response
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Nov 14, 2023
Using Athena AI, the new gen AI layer for Varonis, natural language, customers can conduct in-depth security investigations and analyses more efficiently.
![Gartner DSPM ratings for Varonis](https://info.varonis.com/hubfs/Blog_GartnerLeader_202311_V2.png)
Varonis Leads DSPM Market on Gartner Peer Insights
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Nov 09, 2023
As a leader in data security, Varonis is proud to be rated No. 1 in Gartner’s Data Security Posture Management category.
![](https://info.varonis.com/hubfs/Blog_VaronisAI-NovemberUpdate_BlogHero_202311_FNL.png)
What's New in Varonis: November 2023
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Nov 07, 2023
This month, Varonis’ Data Security Platform gets new features for accelerating investigations, improving your email security posture, and enabling Zero Trust in hybrid environments.
![Megan Garza and Illena Armstrong](https://info.varonis.com/hubfs/Illena%20Armstrong_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Fusing Empathy and Enterprise With Illena Armstrong
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Nov 06, 2023
Illena Armstrong shares her advice for future executives, discusses the importance of teamwork, and explains why empathy is powerful for leaders.
![shield with person attempting to infiltrate it, depicting AI security risks](https://info.varonis.com/hubfs/Blog_GenerativeAISecurity_BlogHero_202404_V1.png)
AI at Work: Three Steps to Prepare and Protect Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Oct 31, 2023
Discover how your business can prepare and protect your sensitive data from the risks that generative AI presents.
![CSPM and DSPM overview](https://info.varonis.com/hubfs/Blog_DSPMvsCSPM_202310_FNL.png)
DSPM vs. CSPM Solutions: Bridging Data and Cloud Security With Varonis
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Oct 27, 2023
Explore the essential roles of DSPM and CSPM solutions, and see how Varonis uniquely enables you to bridge the gap between cloud and data security.
![Michelle Griffey and Megan Garza](https://info.varonis.com/hubfs/Michelle%20Griffey_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: The Importance of Asking for Help With Michelle Griffey
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Oct 24, 2023
Michelle Griffey, Chief Risk Officer for Communisis, shares the importance of asking for help and how the widespread adoption of AI is a good and bad thing.
![](https://info.varonis.com/hubfs/Blog_WhatisaDRA_202309_FNL.png)
What is a Data Risk Assessment and Why You Should Take One
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Oct 23, 2023
Conducting a Data Risk Assessment can help your organization map its sensitive data and build out a comprehensive security strategy. Here's how to perform it.
![Varonis Data Risk Assessment dashboard for data security](https://info.varonis.com/hubfs/Blog_HowVaronisDRAWorks_BlogHero_202406_V1.png)
How Varonis’ Data Risk Assessment Works
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Oct 13, 2023
Explore how Varonis' free Data Risk Assessment works and what makes it the most advanced DRA in the industry. Ensure your data is protected today.
![Megan Garza and Scott Godes](https://info.varonis.com/hubfs/Scott%20Godes_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Behind the Scenes of Cyber Insurance Recovery With Scott Godes
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Oct 11, 2023
Scott Godes, Insurance Recovery Litigator for Barnes & Thornburg LLP, chats about the importance of cyber insurance, and how data privacy has evolved.
![Canda flag on globe](https://info.varonis.com/hubfs/Blog_BlogHero_CanadaDataCenter_202310_FNL.png)
Varonis Launches Data Center in Canada for Cloud-Native Security
![Rachel Hunt](https://info.varonis.com/hubfs/rachel-hunt.jpg)
Oct 11, 2023
We're excited to announce the opening of our data center in Toronto to support new customers and existing customers moving to Varonis' SaaS offering.
![cybersecurity maturation model certification](https://info.varonis.com/hubfs/Blog_CMMC2_202309_V1.png)
Cybersecurity Maturation Model Certification 2.0: How Varonis Ensures Certification for Defense Contractors
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Oct 05, 2023
Varonis can help you achieve compliance and implement the Cybersecurity Maturity Model Certification 2.0 (CMMC) program to safeguard cybersecurity across the government’s DIB.
![Megan Garza and Siwar El Assad](https://info.varonis.com/hubfs/Siwar%20El%20Assad_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Sep 27, 2023
Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.
![DSPM dashboard](https://info.varonis.com/hubfs/Blog_DebunkingDSPMMyths_202309_FNL.png)
DSPM Deep Dive: Debunking Data Security Myths
![Kilian Englert](https://info.varonis.com/hubfs/Varonis_June2021/Images/killian-englert-200x200.jpg)
Sep 21, 2023
DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.
![](https://info.varonis.com/hubfs/Blog_SalesforceShield_202309_FNL.png)
Varonis Announces Salesforce Shield Integration
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Sep 13, 2023
Varonis now integrates with Salesforce Shield to provide deep visibility into Salesforce and help organizations secure their mission-critical data.
![Megan Garza and Rick Howard](https://info.varonis.com/hubfs/Rick%20Howard_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Sep 11, 2023
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
![eyeball with skull, threat detected](https://info.varonis.com/hubfs/Blog/Graphics%20and%20Heroes/Blog_DataBreachStatistics_BlogHero_FNL.png)
The Benefits of Threat and Data Breach Reports
![Scott Shafer](https://info.varonis.com/hubfs/ScottShafer.png)
Sep 08, 2023
Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.
![Salesforce taking data](https://info.varonis.com/hubfs/Blog_SalesforceSecurityRisks_202309_FNL.png)
The Biggest Security Risks to Your Salesforce Org
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Sep 05, 2023
Discover how Salesforce professionals and security teams can combat the most concerning risks in their environments.
![three ways Varonis fights insider threats](https://info.varonis.com/hubfs/Blog_ThreeWaysVaronisFightsInsiderRisk_202309_FNL.png)
Three Ways Varonis Helps You Fight Insider Threats
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Sep 02, 2023
Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.
![AJ Forysiak](https://info.varonis.com/hubfs/AJ%20Forysiak_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Tackling Federal Cybersecurity Challenges With AJ Forysiak
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Aug 30, 2023
Building networks with military, civilian, and intelligence community leaders is just part of AJ’s day-to-day as the Business Development Executive for the Varonis Department of Defense team.
![Illustration of a globe centered on the UK featuring the British flag.](https://info.varonis.com/hubfs/Blog_BlogHero_UKDataCentre_202308_FNL.png)
Varonis Opens UK Data Centre to Support SaaS Customers
![Rachel Hunt](https://info.varonis.com/hubfs/rachel-hunt.jpg)
Aug 29, 2023
UK expansion will help Varonis customers demonstrate compliance with the U.K.’s Data Protection Act.
![shield with person attempting to infiltrate it, depicting AI security risks](https://info.varonis.com/hubfs/Blog_GenerativeAISecurity_BlogHero_202404_V1.png)
Rewards and Risks: What Generative AI Means for Security
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Aug 28, 2023
As AI has grown in popularity, concerns are being raised about the risks involved with using the technology. Learn the rewards and risks of using generative AI.
![CISO first 90 days guide](https://info.varonis.com/hubfs/Blog_CISOFirst90Days_202308_FNL.png)
A CISO's First 90 Days: The Ultimate Action Plan and Advice
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Aug 23, 2023
Over the last 10 years, the role of the CISO has become pretty complex. By the end of this blog you'll have a solid 90-day plan to step into a new CISO role.
![Megan Garza and Kieron Newsham](https://info.varonis.com/hubfs/Kieron%20Newsham_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: Bringing Resiliency and Passion to Cybersecurity with Kieron Newsham
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Aug 15, 2023
Kieron Newsham, Chief Technologist of Cybersecurity for Softcat, shares how his military background helps him in his role and his passion for security.
![Copilot prompt exposing sensitive data that Varonis stops](https://info.varonis.com/hubfs/Blog_Copilot_202403_V1.png)
Copilot Security: Ensuring a Secure Microsoft Copilot Rollout
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Aug 08, 2023
This article describes how Microsoft 365 Copilot's security model works and the risks that must be considered to ensure a safe rollout.
![](https://info.varonis.com/hubfs/Blog_JulyProductNewsletter_202306_FNL.png)
What’s new in Varonis: August 2023
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Aug 07, 2023
This month brings you several new features to help security teams enforce Zero Trust across their cloud and on-prem environments.
![cloud being protected](https://info.varonis.com/hubfs/Blog_ProtectingtheCloud_BlogHero_202308_FNL.png)
How to Protect Your Cloud Environment From Today’s Top 5 Threats
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Aug 04, 2023
Learn the top five cloud threats after your sensitive data and how to protect your organization from them.
![A black justice scale floats on a sapphire blue background. A computer monitor is shown over the scale.](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/blog%20posts/SEC%20Cybersecurity%20Rule/sec-cybersecurity-rule.png)
SEC Cybersecurity Disclosure Requirements’ Impact on Your Business
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Aug 02, 2023
New SEC regulations change how public companies disclose hacks, breaches, and cyber incidents. Here’s everything you need to know.
![](https://info.varonis.com/hubfs/Blog_InsiderThreat_202307_FNL.png)
Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Aug 02, 2023
This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.
![](https://info.varonis.com/hubfs/Justin%20Michael_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: The Impact of AI on Attack Vectors With Justin Michael
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jul 25, 2023
Corbin Capital Partners CTO Justin Michael discusses the hot topic of ChatGPT. Justin leads guarding sensitive data for the leading asset management firm.
![Microsoft Word document surrounded by storm clouds](https://info.varonis.com/hubfs/Blog_VTL_RomCom-Storm-0978_202307_FNL.png)
Taking Microsoft Office by "Storm"
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Jul 18, 2023
The “Storm-0978” ransomware group is actively exploiting an unpatched Microsoft Office and Windows HTML remote code execution vulnerability.
![drive in the cloud being hacked, illustration](https://info.varonis.com/hubfs/Blog_BuildingaCloudSecurityProgram_202307_FNL.png)
Building a Cloud Security Program From the Ground Up
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jul 17, 2023
There’s no one-size-fits-all approach to cloud security, but Varonis has laid out a blueprint to help guide you through the steps and start off strong.
![](https://info.varonis.com/hubfs/Blog/Graphics%20and%20Heroes/Blog_BlogHero_StrengtheningResistence_202305_V1.png)
Strengthening Resilience: Data Security vs Data Resilience Tools
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jul 13, 2023
Learn the difference between backup tools and true DSPs and what to look for when you’re choosing a DSP.
![Megan Garza and Jordan McClintock](https://info.varonis.com/hubfs/Jordan%20McClintick_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: The Importance of Data Privacy With Jordan McClintick
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jul 10, 2023
Jordan McClintick, Director of Data Governance and Privacy for Optiv, Inc. talks about how his law degree helps him in his current role in data privacy.
![](https://info.varonis.com/hubfs/Blog_BlogHero_VaronisSaaSArchitecture_202306_V1.png)
Varonis in the Cloud: Building a Secure and Scalable Data Security Platform
![John Neystadt](https://info.varonis.com/hubfs/Blog_AuthorPhoto_JohnNeystadt.jpg)
Jul 10, 2023
How we built our cloud-native SaaS platform for scalability and security—without taking any shortcuts.
![Black snake graphic exploits computer files](https://info.varonis.com/hubfs/Blog_MOVEit_202306_V2.png)
How the MOVEit Vulnerability Impacts Federal Government Agencies
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 29, 2023
Our latest State of Cybercrime episode examines the MOVEit vulnerability and its impact on victims, including federal government agencies.
![](https://info.varonis.com/hubfs/Blog_Whatsnew_BlogHero_202306_V1.0.png)
What’s new in Varonis: June 2023
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Jun 28, 2023
This month brings more cloud security features to help you better govern your SaaS and IaaS security posture.
![Salesforce logo with users floating to the top, showcasing too many shared permissions and profile accesses](https://info.varonis.com/hubfs/Blog_SalesforceTechnicalDebt_202306_V2.png)
10 Tips to Pay Back Your Salesforce Technical Debt
![Lexi Croisdale](https://info.varonis.com/hubfs/MicrosoftTeams-image%20(1)-1.png)
Jun 22, 2023
Learn best practices for managing and analyzing permissions in Salesforce and how the need for quick solutions can put your organizations data at risk.
![Megan Garza and Matt Radolec in conversation bubbles](https://info.varonis.com/hubfs/Matt%20Radolec_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: The Commoditization of Cybercrime With Matt Radolec
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 21, 2023
Matt Radolec at Varonis discusses the future of cybersecurity, the rise of ransomware-as-a-service (RaaS), and what security risks keep him up at night.
![](https://info.varonis.com/hubfs/Blog_BlogHero_VTL_VisualStudioBug_202305_FNL.png)
Imposter Syndrome: UI Bug in Visual Studio Lets Attackers Impersonate Publishers
![Dolev Taler](https://info.varonis.com/hubfs/dolev-taler.jpg)
Jun 07, 2023
Varonis Threat Labs found a bug in Microsoft Visual Studio installer that allows an attacker to impersonate a publisher and issue a malicious extension to compromise a targeted system
![id badge graphic with passport booklet underneath, red exclamation point showing security breech](https://info.varonis.com/hubfs/Blog_BlogHero_SensitiveDataInSalesforce_202306_FNL.png)
How to Deal With Sensitive Data in Salesforce: A Guide to Data Classification
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Jun 06, 2023
Salesforce Ben and the Varonis team up to discuss Salesforce data classification best practices.
![](https://info.varonis.com/hubfs/Blog_BlogHero_VTL_GhostSites_202305_FNL.png)
Ghost Sites: Stealing Data From Deactivated Salesforce Communities
![Nitay Bachrach](https://info.varonis.com/hubfs/nitay-bachrach.jpg)
May 31, 2023
Varonis Threat Labs discovered improperly deactivated Salesforce 'ghost' Sites that are easily found, accessible, and exploitable by attackers.
![](https://info.varonis.com/hubfs/Pat%20Benoit_Speed%20Data%20Blog%20Hero.jpg)
Speed Data: CISO Leadership Tips With Pat Benoit
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
May 30, 2023
Pat shared the four leadership rules he follows, what it takes to succeed in cybersecurity, and why he just might be “The Most Interesting Man in the World.”
![](https://info.varonis.com/hubfs/Blog_BlogHero_SaaSUpdates_202305_FNL.png)
What's New in Varonis: May 2023
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
May 30, 2023
Check out the new features that help security teams automatically enforce least privilege and uniformly apply sensitivity labels across their hybrid cloud and on-prem environments.
![](https://info.varonis.com/hubfs/Blog_BlogHero_MetaPrivacyViolationFine_202305_V2.png)
Meta's $1.3B Fine: What can Happen if you Don’t Monitor Your PII
![Brian Vecci](https://info.varonis.com/hubfs/brian-vecci.jpg)
May 22, 2023
Continuous discovery and data monitoring critical to identify misplaced PII.
![](https://info.varonis.com/hubfs/Blog_WhatAutomationMeansforCybersecurity_BlogHero_202303_FNL.png)
What Automation Means For Cybersecurity—And Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
May 03, 2023
This article explains how automation can help turn the right information into action, helping to defend against cyberattacks, mitigate risk, shore up compliance and improve productivity.
![](https://info.varonis.com/hubfs/Blog/Graphics%20and%20Heroes/Blog_SalesforceAudit_BlogHero_202205_FNL.png)
Salesforce Misconfiguration Causes Sensitive Data Leaks
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Apr 28, 2023
Brian Krebs recently reported that an alarming number of organizations—including banks and healthcare providers—are leaking sensitive information due to a misconfiguration in Salesforce Communities.
![How Varonis' approach to SSPM helps your company](https://info.varonis.com/hubfs/Blog/Graphics%20and%20Heroes/Blog_SSPM_BlogHero_202207_FNL.png)
How Varonis' Approach to SSPM Helps Your Company
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Apr 26, 2023
Adopt a data-first approach with Varonis' SSPM, securing SaaS apps and reducing risk. Learn how you can get better visibility, automation, and protection.
![](https://info.varonis.com/hubfs/BlogHero_ThirdPartyAppSupport_202304_FNL.png)
Varonis Launches Third-Party App Risk Management
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Apr 25, 2023
Varonis reduces your SaaS attack surface by discovering and remediating risky third-party app connections.
![](https://info.varonis.com/hubfs/Blog_IDSvsIPS_BlogHero_FNL.png)
Data Security Posture Management (DSPM): Best Practices Guide for CISOs
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Apr 19, 2023
Master Data Security Posture Management (DSPM) best practices with our CISOs' guide. Learn to select the right tool, maintain compliance, and prevent data breaches.
![](https://info.varonis.com/hubfs/Blog_BlogHero_RSAC_202304_FNL%20%281%29.png)
Your Guide to the 2023 RSA Conference
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 13, 2023
Varonis has compiled the top RSAC sessions you won’t want to miss. Follow our handy agenda to take advantage of everything RSAC 2023 has to offer.
![](https://info.varonis.com/hubfs/Blog_BlogHero_AustraliaDataCenter_202304_FNL.png)
Varonis Opens Australia Data Centre to Support SaaS Customers
![Rachel Hunt](https://info.varonis.com/hubfs/rachel-hunt.jpg)
Apr 11, 2023
Australian expansion allows Varonis customers to achieve automated data security outcomes while following national standards for data privacy.
![](https://info.varonis.com/hubfs/Blog_DCCFileAnalysis_BlogHero_202208_FNL.png)
The Exact Data Security Roadmap We've Used with 7,000+ CISOs
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Apr 11, 2023
Explore the Varonis data security roadmap for modern protection, aiding 7,000+ CISOs in compliance and safeguarding valuable data.
![Global threat trends and the future of incident response | Varonis](https://info.varonis.com/hubfs/Blog/Blog_BlogHero_ProactiveIncidentResponse_202301_FNL.png)
Global Threat Trends and the Future of Incident Response
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Apr 10, 2023
The Varonis Incident Response team discusses recent global threat trends and shares why proactive IR is the future of data security.
![](https://info.varonis.com/hubfs/Blog_CybersecurityStatistics_BlogHero_202206_FNL-1.png)
80 Cybersecurity Statistics and Trends [updated 2023]
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Mar 29, 2023
We’ve compiled more than 70 cybersecurity statistics for 2023, to give you a better idea of the current state of overall security.
![](https://info.varonis.com/hubfs/Blog_DomainController_BlogHero_202208_FNL.png)
Top Cybersecurity Trends for 2023
![Megan Garza](https://info.varonis.com/hubfs/Megan_Author%20Photo.png)
Mar 23, 2023
We’ve pulled together top security predictions for 2023 to help you determine where you should heed caution and where you can breathe easily.
![](https://info.varonis.com/hubfs/Blog_ForresterWave_BlogHero_202303_FNL%20%281%29.png)
Varonis Named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023
![Avia Navickas](https://info.varonis.com/hubfs/avia-navickas.jpg)
Mar 22, 2023
Varonis Named a Leader in the Forrester Wave™: Data Security Platforms, Q1 2023, receiving the highest score in the strategy category.
![](https://info.varonis.com/hubfs/Blog_CCPA_BlogHero_202303_FNL.png)
A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Mar 10, 2023
CCPA Compliance: Everything you need to know about protecting user data under the California Consumer Privacy Act.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_HIPAACompliance_BlogHero_202203_FNL.png)
HIPAA Compliance: Your Complete 2023 Checklist
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Mar 10, 2023
Is your organization ready to comply with 2023 HIPAA updates and changes? Ensure HIPAA compliance with your comprehensive 2023 checklist.
![](https://info.varonis.com/hubfs/Blog_SalesforceAdmin_BlogHero_202303_FNL-1.png)
How Varonis Saves Salesforce Admins Hours in Their Day
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Mar 08, 2023
Varonis provides industry leading Salesforce management and permission implications capabilities to help save Salesforce admins hours in their day.
![](https://info.varonis.com/hubfs/Blog_RansomwareStrain_Generic_BlogHero_202203_V1.0-01-1.png)
HardBit 2.0 Ransomware
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Feb 20, 2023
HardBit is a ransomware threat that targets organizations to extort cryptocurrency payments for the decryption of their data. Seemingly improving upon their initial release, HardBit version 2.0 was introduced toward the end of November 2022, with samples seen throughout the end of 2022 and into 2023.
![](https://info.varonis.com/hubfs/Blog_Nero4JInjection_BlogHero_202210_V1_OptB%20%281%29.png)
Neo4jection: Secrets, Data, and Cloud Exploits
![Nitay Bachrach](https://info.varonis.com/hubfs/nitay-bachrach.jpg)
Feb 08, 2023
With the continuous rise of graph databases, especially Neo4j, we're seeing increased discussions among security researchers about issues found in those databases. However, given our experience with graph databases ― from designing complex and scalable solutions with graph databases to attacking them ― we've noticed a gap between public conversations and our security researchers' knowledge of those systems.
![](https://info.varonis.com/hubfs/Blog_AnatomyofaRansomwareAttack_202206_V2.0-01-1.png)
VMware ESXi in the Line of Ransomware Fire
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Feb 07, 2023
Servers running the popular virtualization hypervisor VMware ESXi have come under attack from at least one ransomware group over the past week, likely following scanning activity to identify hosts with Open Service Location Protocol (OpenSLP) vulnerabilities.
![](https://info.varonis.com/hubfs/Blog_GitHubSecretsDiscovery_BlogHero_202301_FNL%20%281%29.png)
Varonis Enhances GitHub Security Offering With Secrets Discovery and Data Classification
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Feb 07, 2023
Varonis is extending our world-class data classification capabilities to discover secrets, keys, and other sensitive data embedded in your GitHub repositories and source code.
![](https://info.varonis.com/hubfs/Blog_BlogHero_ProactiveIncidentResponse_202301_FNL.png)
Varonis Announces Proactive Incident Response for SaaS Customers
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Jan 31, 2023
Varonis offers the brightest minds in offensive and defensive security, watching your data for threats.
![](https://info.varonis.com/hubfs/Blog_BlogHero_AutomatedPostureManagement_202301_FNL.png)
Introducing Automated Posture Management: Fix Cloud Security Risks with One-Click
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jan 26, 2023
Varonis launches Automated Posture Management to effortlessly fix cloud Security risks with a simple click of a button
![](https://info.varonis.com/hubfs/Blog_VTL-OktaVulnerabilities_BlogHero_202211_V1.2.png)
CrossTalk and Secret Agent: Two Attack Vectors on Okta's Identity Suite
![Tal Peleg and Nitay Bachrach](https://info.varonis.com/hubfs/preview-full-Blog_AuthorPhoto_ThreatLabs_202103_FNL.webp)
Jan 23, 2023
Varonis Threat Labs discovered and disclosed two attack vectors on Okta's identity suite: CrossTalk and Secret Agent.
![](https://info.varonis.com/hubfs/MicrosoftTeams-image%20%289%29.png)
Introducing Least Privilege Automation for Microsoft 365, Windows, Google Drive, and Box
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Jan 17, 2023
Varonis announces least privilege automation for Microsoft 365, Google Drive, and Box.
![](https://info.varonis.com/hubfs/Blog_NewDashboard_BlogHero_202212_V2.png)
Varonis Launches Customizable Data Security Posture Management (DSPM) Dashboard
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jan 03, 2023
Varonis introduces a new customizable DSPM dashboard to help improve data security posture management
![](https://info.varonis.com/hubfs/Blog_USPrivacyLaws_BlogHero_202208_FNL.webp)
Australian Privacy Act 2022 Updates
![Michael Buckbee](https://info.varonis.com/hubfs/Varonis_June2021/Images/michael-buckbee-200x200-150x150.jpg)
Dec 19, 2022
A series of stunning data breaches in 2022 has prompted lawmakers to begin making changes to the 1988 Australian Privacy Act in the form of the new Privacy Legislation Amendment (Enforcement and Other Measures) Bill 2022.
![file analysis for cloud data classification](https://info.varonis.com/hubfs/Blog_DCCFileAnalysis_BlogHero_202208_FNL.png)
Varonis adds file analysis to cloud data classification capabilities
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Dec 01, 2022
We’re excited to announce that Data Classification Cloud now includes robust file analysis for verifying classification results across your cloud environment.
![](https://info.varonis.com/hubfs/Blog_ForbesOct_202211_FNL-01.png)
Four Must-Know Cyber Tips for Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Dec 01, 2022
The real story behind today’s breaches is never about an isolated bad decision—it’s about the many decisions made long before a sleepy network administrator gets a call from an attacker.
![](https://info.varonis.com/hubfs/Blog_VTL-Zendesk_BlogHero_202211_V3.png)
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk
![Tal Peleg](https://info.varonis.com/hubfs/tal-peleg.jpg)
Nov 15, 2022
Varonis Threat Labs found a SQL injection vulnerability and a logical access flaw in Zendesk Explore, the reporting and analytics service in the popular customer service solution, Zendesk.
![](https://info.varonis.com/hubfs/Blog_Windows_BlogHero_202210_V2.png)
The Logging Dead: Two Event Log Vulnerabilities Haunting Windows
![Dolev Taler](https://info.varonis.com/hubfs/dolev-taler.jpg)
Oct 25, 2022
You don’t have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog, a pair of Windows vulnerabilities discovered by the Varonis Threat Labs team.
![Varonis and Coretx XSOAR](https://info.varonis.com/hubfs/Blog_Varonis+CortexXSOAR_BlogHero_202209_FNL.png)
Automate Data Security With Varonis Data-centric Insights and Cortex XSOAR
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Oct 24, 2022
Discover how to leverage Varonis data risk insights with Cortex XSOAR to accelerate investigations.
![](https://info.varonis.com/hubfs/Blog_IDOR_BlogHero_202209_FNL.png)
What is IDOR (Insecure Direct Object Reference)?
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Oct 14, 2022
Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.
![](https://info.varonis.com/hubfs/Blog_AzureManagingIdentities_BlogHero_202209_FNL.png)
Azure Managed Identities: Definition, Types, Benefits + Demonstration
![Neeraj Kumar](https://info.varonis.com/hubfs/Imported%20images/neeraj_sm1.jpg)
Oct 05, 2022
Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.
![](https://info.varonis.com/hubfs/Blog_DataRiskReport_2022.png)
SaaS Risk Report Reveals Exposed Cloud Data is a $28M Risk for Typical Company
![Rachel Hunt](https://info.varonis.com/hubfs/rachel-hunt.jpg)
Oct 04, 2022
The Great SaaS Data Exposure examines the challenge CISOs face in protecting data across a growing portfolio of SaaS apps and services such as Microsoft 365.
![](https://info.varonis.com/hubfs/Blog_PCI_BlogHero_202211_FNL.png)
The 12 PCI DSS Requirements: 4.0 Compliance Checklist
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Oct 03, 2022
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) is right around the corner. Prepare with our PCI DSS compliance checklist.
![](https://info.varonis.com/hubfs/Blog_DCESecrets_BlogHero_202209_FNL.png)
Varonis Adds Secrets Discovery for On-Prem and Cloud Data Stores
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Sep 27, 2022
Varonis can help you scan your environments for rogue secrets exposed in files and code stored on-prem and in the cloud.
![](https://info.varonis.com/hubfs/Blog_SecuringAWS_BlogHero_202209_FNL.png)
Change These 7 Security Settings After Creating a New AWS Account
![Shane Waterford](https://info.varonis.com/hubfs/Shane_Waterford_2022.jpg)
Sep 16, 2022
Use these seven AWS security best practices for simple configuration changes on a new AWS account.
![](https://info.varonis.com/hubfs/Blog_NewPAC-and-GoldenTicket_BlogHero_202208_FNL%20%281%29.png)
Fighting Golden Ticket Attacks with Privileged Attribute Certificate (PAC)
![Masha Garmiza](https://info.varonis.com/hubfs/masha.png)
Sep 15, 2022
Learn how and why to control the Active Directory Environment state with PACRequestorEnforcement, the implications of doing so and how to detect Golden Ticket attacks happening in your network.
![](https://info.varonis.com/hubfs/Blog_SalesforcePermissions_BlogHero_202208_FNL.png)
Compare Salesforce user permissions with ease
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Sep 13, 2022
DatAdvantage Cloud now enables admins to compare two Salesforce users’ effective permissions side-by-side with a simple click of a button.
![](https://info.varonis.com/hubfs/Blog_DataLeak_BlogHero_202209_FNL.png)
What Is a Data Leak? Definition and Prevention
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Sep 09, 2022
Learn why data leaks can be devastating for companies and how you can defend against them.
![](https://info.varonis.com/hubfs/zero-trust-hero-3.jpg)
What Is Zero Trust? Architecture and Security Guide
![Michael Buckbee](https://info.varonis.com/hubfs/Varonis_June2021/Images/michael-buckbee-200x200-150x150.jpg)
Sep 09, 2022
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.
![](https://info.varonis.com/hubfs/Blog_USPrivacyLaws_BlogHero_202208_FNL.png)
U.S. Privacy Laws: The Complete Guide
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Sep 02, 2022
This guide breaks down the entirety of the U.S. privacy law ecosystem to help you understand the rights and obligations of citizens and businesses.
![](https://info.varonis.com/hubfs/Blog_SOC2Compliance_BlogHero_202208_FNL.png)
SOC 2 Compliance Definition & Checklist
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Aug 26, 2022
System and Organization Controls (SOC 2) compliance requires adherence to specific guidelines. This detailed definition and checklist can get you started.
![](https://info.varonis.com/hubfs/Blog_Mimikatz_BlogHero_202208_FNL.png)
What is Mimikatz? The Beginner's Guide
![Michael Buckbee](https://info.varonis.com/hubfs/Varonis_June2021/Images/michael-buckbee-200x200-150x150.jpg)
Aug 26, 2022
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.
![](https://info.varonis.com/hubfs/Blog_Ransomware_BlogHero_Solidbit_V1.png)
Anatomy of a SolidBit Ransomware Attack
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Aug 22, 2022
Solidbit is a ransomware variant derived from Yashma and containing elements of LockBit. Discover how Solidbit's capabilities, execution, what file types it targets, and how to tell if you're been infected.
![](https://info.varonis.com/hubfs/Blog_Wireshark_BlogHero_202203-1.png)
How to Use Wireshark: Comprehensive Tutorial + Tips
![Kody Kinzie](https://info.varonis.com/hubfs/Varonis_June2021/Images/kody_bw-150x150.jpg)
Aug 19, 2022
Learn how to use Wireshark, a widely-used network packet and analysis tool. This tutorial has everything from downloading to filters to packets.
![](https://info.varonis.com/hubfs/Blog_Forbes-SalesData_BlogHero_202208_FNL.png)
Your Sales Data Is Mission-Critical: Are You Protecting It?
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Aug 18, 2022
If you’re like many executives, you might assume your data is secure within those cloud applications. That’s a dangerous assumption, though. Cloud providers are responsible for everything that delivers their application (e.g., their data center); it’s your responsibility to protect the data inside it.
![Varonis Cloud Security MITRE ATT&CK](https://info.varonis.com/hubfs/Blog_MitreAttackAlerts_BlogHero_202208_FNL.png)
Varonis Maps Cloud Security Alerts to MITRE ATT&CK
![Yumna Moazzam](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Moazzam_2022_FNL.jpg)
Aug 17, 2022
In Varonis’ latest update of DatAdvantage Cloud, we’re layering MITRE ATT&CK tactics and techniques over cloud alerts to aid in faster incident response.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/how-to-configure-s3-hero.png)
How to Create S3 Buckets in AWS with CloudFormation: Step-by-Step Guide
![Shane Waterford](https://info.varonis.com/hubfs/Shane_Waterford_2022.jpg)
Jul 22, 2022
Use AWS CloudFormation to create resources such as S3 buckets. Infrastructure as code enables a repeatable, reliable deployment process. Learn more here.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/sql-injection-hero.png)
What Is SQL Injection? Identification & Prevention Tips
![Alvin Mwambi](https://info.varonis.com/hubfs/Alvin_Mwambi_2022.jpg)
Jul 22, 2022
SQL injection is a serious open web application security project (OWASP) vulnerability. Learn more about how to combat injection attacks in this article.
![](https://info.varonis.com/hubfs/privacy-impact-assessment-hero.png)
What Is a Privacy Impact Assessment (PIA)?
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jul 22, 2022
A privacy impact assessment (PIA) helps firms protect data. Find out about this robust approach to data loss prevention and how to implement your own PIA.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_CybersecurityStatistics_BlogHero_202206_V2.png)
161 Cybersecurity Statistics and Trends [updated 2023]
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Jul 08, 2022
These cybersecurity statistics for 2023 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, job outlook.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/blog%20posts/data-lifecycle-management-hero.png)
Data Lifecycle Management (DLM): Everything You Need to Know
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jul 08, 2022
Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/cia-triad-1.png)
What is the CIA Triad?
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jul 08, 2022
Learn how the CIA triad can be used to classify, secure, and protect your data.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_NetworkAccessControl_BlogHero_202207_FNL.png)
What Is Network Access Control? Explaining NAC Solutions
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jul 07, 2022
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/ransomware-stats.png)
Ransomware Statistics, Data, Trends, and Facts [updated 2023]
![Rob Sobers](https://info.varonis.com/hubfs/rob-sobers.jpg)
Jul 05, 2022
Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_SSPM_BlogHero_202207_FNL.png)
What is SSPM? Overview + Guide to SaaS Security Posture Management
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jul 01, 2022
SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_SOX_BlogHero_202206_FNL.png)
SOX Compliance Checklist & Audit Preparation Guide
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 30, 2022
The Sarbanes-Oxley Act (SOX) requires public U.S. companies meet strict reporting and security standards. Here’s what you need to know to comply with SOX.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_IDSvsIPS_BlogHero_FNL.png)
IDS vs. IPS: What Organizations Need to Know
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 30, 2022
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_DoH_BlogHero_202206_FNL.png)
DNS over HTTPS as a covert Command and Control channel
![Masha Garmiza](https://info.varonis.com/hubfs/masha.png)
Jun 30, 2022
Learn how DNS over HTTPS (DoH) is being actively used as a Command and Control (C2) channel by threat actors.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_RedTeaming_BlogHero_202203_FNL.png)
What is Red Teaming? Methodology & Tools
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 29, 2022
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/what-is-a-security-policy-hero.png)
What is a Security Policy? Definition, Elements, and Examples
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jun 29, 2022
A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_OpenXDR_BlogHero_202203_FNL.png)
What is Open XDR? Benefits and Security Comparisons
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_Traceroute_BlogHero_202203_FNL.png)
What is Traceroute? How It Works and How to Read Results
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jun 25, 2022
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_RyukRansomware_BlogHero_202203_FNL.png)
Ryuk Ransomware: Breakdown and Prevention Tips
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 25, 2022
Ryuk ransomware targets large organizations and spreads with deadly speed. Learn about the strain and how to prevent your company from becoming a victim.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_InsiderThreat_BlogHero_202203_FNL.png)
What is an Insider Threat? Definition and Examples
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jun 24, 2022
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/evil-twin-attacks-hero.png)
Evil Twin Attack: What it is, How to Detect & Prevent it
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_AnatomyofaRansomwareAttack_202206_V2.0-01.png)
Anatomy of a LockBit Ransomware Attack
![Joseph Avanzato](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/joseph.jpg)
Jun 17, 2022
A detailed case study of the exact techniques and methods that threat actors used in a real-life ransomware attack.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_CyberEspionage_BlogHero_202203_FNL.png)
What is Cyber Espionage? Complete Guide with Protection Tips
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jun 16, 2022
Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_LNKAttackTechnique_BlogHero_202206_FNL.png)
Rogue Shortcuts: LNK'ing to Badness
![Jason Hill](https://info.varonis.com/hubfs/jason-hill.jpg)
Jun 16, 2022
Learn how threat actors continue to manipulate Windows shortcut files (LNKs) as an exploit technique.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_AWS-S3-Classification_BlogHero_202206_FNL.png)
Varonis Adds Data Classification Support for Amazon S3
![Nathan Coppinger](https://info.varonis.com/hubfs/nathan-coppinger.jpg)
Jun 15, 2022
Varonis bolsters cloud security offering with data classification for Amazon S3.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_GroupPolicyObjects_BlogHero_202203_FNL.png)
Group Policy Objects (GPOs): How They Work & Configuration Steps
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 15, 2022
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_SecureGoogleDrive_BlogHero_202203_FNL.png)
Data Protection Guide: How To Secure Google Drive for Your Business
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 15, 2022
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_DataGovernance_BlogHero_202203_FNL.png)
What Is Data Governance? Framework and Best Practices
![David Harrington](https://info.varonis.com/hubfs/Varonis_June2021/Images/david-harrington-1-300x300.jpg)
Jun 07, 2022
Data Governance helps organize, secure, and standardize data for all types of organizations. Learn more about data governance frameworks here.
![compliance checklist](https://info.varonis.com/hubfs/Blog_Compliance_202405_FNL.png)
ISO 27001 Compliance Guide: Essential Tips and Insights
![Robert Grimmick](https://info.varonis.com/hubfs/Varonis_June2021/Images/grimmickheadshot-150x150.jpg)
Jun 03, 2022
Looking to earn ISO 27001 compliance? Learn about this widely known information security standard, what’s in it, and how to become certified.
![A dark blue checklist titled NIST 800-53 COMPLIANT floats over a blue gradient background.](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_NIST800-53_BlogHero_202203_FNL.png)
NIST 800-53: Definition and Tips for Compliance
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 03, 2022
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
Try Varonis free.
Deploys in minutes.