-
Threat ResearchOct 30, 2025
The Silent Attackers: Exploiting VPC Endpoints to Expose AWS Accounts of S3 Buckets Without a Trace
Learn how a CloudTrail flaw revealed IDs via VPC endpoints and how to protect your cloud.
Maya Parizer
5 min read
-
Varonis ProductsOct 30, 2025
What's New in Varonis: October 2025
Discover Varonis' latest features, including AI Identity Protection for Salesforce Agentforce and enhanced support for Google Workspace.
Nolan Necoechea
1 min read
-
Threat ResearchOct 28, 2025
Meet Atroposia: The Stealthy Feature-Packed RAT
Atroposia is a stealthy RAT with HRDP, credential theft, DNS hijacking & fileless exfiltration — aka cybercrime made easy for low-skill attackers.
Daniel Kelley
5 min read
-
Email SecurityOct 24, 2025
Trusted Vendors, Twisted Links: The Dark Side of URL Rewriting
Discover how attackers use advanced URL rewriting tricks to bypass traditional blocklists and how organizations can stay ahead of evolving threats.
Stephen Kowski
3 min read
-
Privacy & ComplianceOct 23, 2025
What India’s Digital Personal Data Protection Act Means for Security
Learn how India’s Digital Personal Data Protection (DPDP) Act is shifting global data privacy and gain insights on reducing risk and ensuring compliance.
Lexi Croisdale
2 min read
-
FederalOct 22, 2025
Why Compliance Does Not Equate to Security: A Data-Centric Perspective
Regulatory compliance alone isn’t enough to ensure true data security. Explore the critical gaps between compliance and proactive protection.
AJ Forysiak
3 min read
-
Azure Cloud Security Threat ResearchOct 21, 2025
Azure App-Mirage: Bypassing Application Impersonation Safeguard
Varonis Threat Labs discovered a loophole allowing attackers to impersonate Microsoft applications by creating malicious apps with deceptive names.
Tomer Basin
5 min read
-
AI Security Email SecurityOct 21, 2025
AI-Powered Phishing Is Outpacing Traditional Defenses — Here’s How to Keep Up
AI-powered phishing is outsmarting email security. Discover a multilayered defense from Gartner and how Varonis Interceptor protects your inbox.
Lexi Croisdale
4 min read
-
Email SecurityOct 16, 2025
Inbox Infiltration: The File Type You’re Overlooking
Discover how attackers use SVG files to hide malicious JavaScript in images, and learn how to defend against these evolving phishing threats.
Stephen Kowski
3 min read
-
AI Security Identity Salesforce Varonis ProductsOct 14, 2025
Varonis Introduces AI Identity Protection for Salesforce Agentforce
Discover how Varonis AI Identity Protection secures Salesforce data from over-permissioned AI agents, enabling safe deployment and innovation.
Eugene Feldman
2 min read
-
Data SecurityOct 13, 2025
What is Database Activity Monitoring? DAM Explained
A critical component of any organization's security strategy, Database Activity Monitoring tools are used by organizations to fulfill compliance criteria and protect sensitive data.
Daniel Miller
6 min read
-
Threat ResearchOct 09, 2025
From CPU Spikes to Defense: How Varonis Prevented a Ransomware Disaster
Discover how Varonis' advanced threat response ensured zero downtime and complete remediation when stopping a ransomware attack.
Joseph Avanzato
5 min read
-
AI Security Email Security Varonis ProductsOct 08, 2025
Introducing Varonis Interceptor: AI-Native Email Security
Varonis Interceptor protects organizations from a new breed of AI-powered email threats with the best phishing detection on the planet.
Shawn Hays
3 min read
-
Data SecurityOct 06, 2025
Rethinking Database Security for the Age of AI and Cloud
Discover the pillars of database security and how Varonis Next-Gen database activity monitoring (DAM) protects sensitive data in AI and cloud environments.
Terry Ray
4 min read
-
Ransomware Threat ResearchOct 01, 2025
ForcedLeak and the Future of AI Agent Security
ForcedLeak exposes Salesforce Agentforce to silent CRM data theft via prompt injection, agent overreach, and CSP misconfig. Mitigate now.
Daniel Miller
3 min read
-
Data Security Privacy & ComplianceOct 01, 2025
Top 10 Cybersecurity Awareness Tips: How to Stay Safe and Proactive
With breaches on the rise, it’s crucial to make cybersecurity a priority. Follow these preventative cybersecurity tips for stronger security practices.
Lexi Croisdale
5 min read
-
DSPM Varonis ProductsSep 30, 2025
Securing Sensitive Data in Databricks
Secure sensitive data in Databricks with deep visibility, proactive remediation, and active threat detection using Varonis.
Collaborative Article
2 min read
-
Threat ResearchSep 30, 2025
MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments
Discover how PDF-based malware attacks work and how AI-powered email security can detect and block threats before they reach your inbox.
Daniel Kelley
5 min read
-
Email Security Threat ResearchSep 29, 2025
The Fake Bureau of Investigation: How Cybercriminals Are Impersonating Government Pages
The FBI is noticing a large uptick in fraudulent websites impersonating the IC3. Learn how users are unsuspectingly reporting cybercrime to cybercriminals.
Shawn Hays
4 min read
-
Varonis ProductsSep 26, 2025
What's New in Varonis: September 2025
Discover Varonis' latest features, including AI-native email security, new data protection policies, and new threat detection policies for Azure and Exchange Online.
Nolan Necoechea
2 min read
-
AI SecuritySep 26, 2025
CyberTech Tokyo 2025: Security in the Age of Generative AI
Discover the key insights from CyberTech Tokyo 2025, the growing risk of generative AI, and steps organizations can take to strengthen their data security.
Lexi Croisdale
4 min read
-
Varonis ProductsSep 25, 2025
Accurate Classification that Scales: The Right Tool for the Right Job
Accurate, scalable data classification is key to security, compliance, and safe AI. Learn how to avoid common pitfalls and choose the right approach.
Ed Lin
6 min read
-
Cloud Security Threat ResearchSep 25, 2025
Where Are my Keys?! Ransomware Group Steals AWS Keys to Advance
Ransomware groups now target AWS control planes using stolen keys and Pacu. Learn how Varonis detects, investigates, and stops these cloud threats.
Simon Biggs
5 min read
-
Data Security HealthcareSep 24, 2025
Research Reveals Healthcare Orgs Have 90% of Sensitive Data Exposed to AI
Varonis studied 98 IT environments to assess AI’s impact on healthcare, biotech, and pharma — and how organizations can better protect critical data.
Lexi Croisdale
1 min read
-
AI Security Data SecuritySep 19, 2025
AI Security Starts with Data Security
Learn how to protect AI pipelines by controlling data access, monitoring AI behavior, and preventing data exposure.
Jonathan Villa
5 min read
-
Threat ResearchSep 17, 2025
BIDI Swap: Unmasking the Art of URL Misleading with Bidirectional Text Tricks
Varonis reveals a decade-old Unicode flaw that enables BiDi URL spoofing and poses phishing risks. Learn how attackers exploit RTL/LTR scripts and browser gaps.
Dolev Taler
3 min read
-
Cloud Security SalesforceSep 12, 2025
OAuth Connected Application Control : Lock Down Your Salesforce Environment Before Attackers Log In
Lock down your Salesforce environment and stop OAuth-based threats with the CRM's new API Access Control. Varonis Threat Labs explains how it works and why it's important.
Varonis Threat Labs
5 min read
-
FederalSep 11, 2025
CMMC Final Rule Arrives — What It Means and How Varonis Can Help
The DoD announced the final rule for the Cybersecurity Maturity Model Certification (CMMC), making compliance a gatekeeper for doing business with the DoD — here's what you need to know.
Trevor Douglas
2 min read
-
AI Security Threat ResearchSep 10, 2025
AI-Generated Phishing: How One Email Triggered a Global NPM Supply Chain Crisis
A massive phishing-led NPM attack compromised popular packages with 2.67B weekly downloads, hijacking crypto wallets via stealthy AI-generated emails.
Varonis Threat Labs
5 min read
-
DSPM FederalSep 09, 2025
Strengthening Data Security Posture Management (DSPM) for Tribal Nations
Tribal Nations are highly targeted subjects of cyberattacks. This will serve as a guide to what DSPM is, why it is so important, and how Varonis can help.
Jacob Doster
5 min read
-
AI Security Threat ResearchSep 08, 2025
SpamGPT: The AI Tool Elevating Email Security Threats for Enterprises
SpamGPT is a new AI-powered email attack tool that is changing the way businesses address email security issues. Learn how this technology makes phishing attacks more effective and how to protect your company's email systems ahead of time.
Daniel Kelley
3 min read
-
AI SecuritySep 06, 2025
Detecting Agentic AI Threats with Agentic AI
Detect and stop agentic AI threats with agentic AI: autonomous agents that monitor, investigate, and respond faster than traditional security tools.
Jonathan Villa
6 min read
-
Threat ResearchSep 04, 2025
Cyber Resilience Assessment: Identifying Detection Gaps and Strengthening Security
Validate your security tools with a real-world attack simulation that reveals detection gaps and boosts your cyber resilience.
Seth Priestner
2 min read
-
Cloud Security SalesforceSep 03, 2025
When Integrations Become Infiltrations: What the Salesloft Drift Breach Reveals About SaaS Risk
Learn how attackers exploited SaaS integrations in the Drift breach — and how to protect your Salesforce organization today.
Daniel Miller
5 min read
-
Data Security Varonis ProductsSep 02, 2025
Varonis Acquires SlashNext, AI-Native Email Security
Strategic acquisition adds the world’s best phishing and social engineering detection to the leading Data Security Platform.
Yaki Faitelson
2 min read
-
Threat ResearchAug 29, 2025
Hidden in Plain Sight: A Misconfigured Upload Path That Invited Trouble
A misconfigured upload path exposed a Linux web server to attack. Varonis Threat Labs reveals how it happened and how to prevent future breaches.
Siddharth Jain
5 min read
-
Data Security SalesforceAug 27, 2025
Anatomy of a Salesforce Data Breach: Stopping User Impersonation
How a bad actor systematically impersonates users to exfiltrate millions of Salesforce records.
Nolan Necoechea
3 min read
-
Cloud SecurityAug 20, 2025
The Cloud Threat Playbook: Catching What Posture Tools Miss
Identity is the new perimeter. Learn how Varonis stops cloud breaches by resolving access, detecting threats, and automating least privilege.
Daniel Miller
4 min read
-
Data Security FederalAug 18, 2025
Why Data-Centric Security is Important for the DoD
Learn how Varonis protects DoD environments by utilizing various approaches to secure sensitive data.
Patrick Long
3 min read
-
AI Security Threat ResearchAug 14, 2025
Understanding and Defending Against the Model Context Protocol DNS Rebind Attack
As organizations increasingly rely on MCP servers to bridge AI capabilities with business systems, understanding and defending against threats is critical.
Varonis Threat Labs
6 min read
-
AI Security HealthcareAug 13, 2025
From Rome to Radiology: Italy’s Response to AI Risks in Healthcare
Italy is addressing AI risks in healthcare, recently giving clear data protection decrees from the Garante per la protezione dei dati personali.
Shawn Hays
4 min read
-
AI Security DSPMAug 12, 2025
Deepfakes and Voice Clones: Why Identity Security is Mission-Critical in the AI Era
AI impersonation and deepfake fraud are rising fast. Learn how Varonis protects identities, secures data, and stops attackers before damage is done.
Daniel Miller
3 min read
-
Cloud Security Threat ResearchAug 11, 2025
Rusty Pearl: Remote Code Execution in Postgres Instances
Varonis uncovers an RCE vulnerability in PostgreSQL via PL/Perl and PL/Rust. Learn how AWS RDS responded and how to secure your Postgres environment.
Tal Peleg
6 min read
-
Data Security Microsoft 365 Threat ResearchAug 05, 2025
Varonis Incident Response: Stopping Microsoft 365 Direct Send Abuse
Learn how Varonis Threat Labs uncovered a critical Microsoft 365 Direct Send exploit, and how organizations leveraged Varonis Incident Response to protect themselves from attack.
Brian Walsh
2 min read
-
Varonis ProductsJul 31, 2025
What’s New in Varonis: July 2025
Discover Varonis' latest features, including database activity monitoring, CSPM enhancements, Salesforce access graph, and more.
Nathan Coppinger
3 min read
-
AI SecurityJul 28, 2025
ChatGPT DLP: What Enterprises Need to Know
Learn how to prevent data leaks from ChatGPT with AI-specific DLP strategies covering risk, policy, controls, and compliance for secure enterprise AI use.
Jonathan Villa
7 min read
-
Varonis ProductsJul 28, 2025
Varonis Introduces Next-Gen Database Activity Monitoring
Reinventing Database Security: A simple, agentless solution to database security and compliance built for the AI era.
Eugene Feldman
2 min read
-
Cloud Security Threat ResearchJul 25, 2025
What Salesforce Organizations Need to Know About ShinyHunters and Vishing
Learn about the vishing and recent attacks from ShinyHunters' targeting Salesforce environments and how your org can stay protected from data breaches and extortion.
Varonis Threat Labs
6 min read
-
AI SecurityJul 24, 2025
Why Least Privilege Is Critical for AI Security
Understand what the principle of least privilege (PoLP) is, how avoiding it creates risk for organizations, and how embracing it helps you stay secure in the face of AI innovation.
Nolan Necoechea
4 min read
-
Cloud Security Varonis ProductsJul 22, 2025
Varonis Enhances CSPM Capabilities to Protect Cloud Data
Varonis enhances its CSPM capabilities to provide centralized risk visibility, expanded misconfiguration detection, and unified workflows.
Nathan Coppinger
2 min read
-
Microsoft 365 Threat ResearchJul 21, 2025
ToolShell: A SharePoint RCE chain actively exploited
ToolShell is a critical SharePoint RCE exploit chain. Learn how it works, who’s at risk, and how to protect your environment before it’s too late.
Varonis Threat Labs
4 min read
-
AI Security Data SecurityJul 17, 2025
Creating Custom GPTs and Agents That Balance Security and Productivity
Custom GPTs and AI agents compound productivity, but with that comes added risk. Learn about ChatGPT's custom GPTs and how to build them with data security in mind.
Jonathan Villa
4 min read
-
Cloud Security Threat ResearchJul 17, 2025
Copy-Paste Pitfalls: Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
A subtle versioning error in Microsoft’s AppLocker block list exposes a bypass risk — learn how to spot and fix this overlooked security gap.
Dolev Taler
2 min read
-
AI Security Email SecurityJul 17, 2025
How Threat Actors Use AI to Hide Malicious Sites
Discover how cybercriminals use cloaking to hide malicious sites from bots and scanners while deceiving users. Plus, learn how to uncover these hidden threats.
Daniel Kelley
6 min read
-
Microsoft 365 Ransomware Threat ResearchJul 16, 2025
Take it Easy: How Attackers use AI and No-Code Tools with M365 for "Native Phishing"
A real-world look at how attackers use OneNote, OneDrive, and AI/no-code tools like Flazio for phishing, and practical steps to defend your organization today.
Tom Barnea
3 min read
-
Cloud Security Threat ResearchJul 16, 2025
Behind the Making of Operation Frostbyte: The First Snowflake GOAT
Complete Operation Frostbyte, an interactive mission created by Varonis Threat Labs to test the cybersecurity community’s Snowflake data security knowledge.
Lexi Croisdale
4 min read
-
Azure Cloud Security DSPM Identity Microsoft 365Jul 14, 2025
Multi-Cloud Identity: What to Consider
Learn about enhancing multi-cloud security with authentication, access intelligence, automated remediation, unified monitoring, and compliance best practices.
Daniel Miller
5 min read
-
Data Security FederalJul 14, 2025
From Snowden to Signalgate: What We Still Haven’t Fixed in Cybersecurity
Explore major data breaches, their common thread, and practical solutions for data-centric security.
Daniela Lulli
3 min read
-
Data SecurityJul 10, 2025
Varonis Incident Response: Preventing PII Exposure in Box
Learn how the Varonis Incident Response team prevented PII from being compromised, and what this means for data in cloud collaboration platforms like Box.
Brian Walsh
2 min read
-
AI Security Data SecurityJul 09, 2025
ChatGPT Enterprise Connectors: How to Prepare for the Major Shift in Data Access
ChatGPT Enterprise is changing in the way it retrieves data and surfaces information to users in prompt responses. Learn about the new connectors and risks.
Shawn Hays
6 min read
-
Cloud Security Threat ResearchJul 09, 2025
Count(er) Strike – Data Inference Vulnerability in ServiceNow
Varonis Threat Labs discovered a high severity vulnerability in ServiceNow’s platform that can lead to significant data exposure and exfiltration.
Neta Armon
10 min read
-
AI Security Data SecurityJul 01, 2025
Varonis Announces Strategic Partnership with Microsoft to Help Secure the Future of AI
Companies join forces to deliver scalable data security, governance, and compliance for the AI era
Yaki Faitelson
1 min read
-
AI Security Data SecurityJun 30, 2025
Hidden Risks of Shadow AI
Shadow AI is on the rise as employees adopt unsanctioned AI tools. Learn the risks it poses to security and compliance, and how to manage it responsibly.
Jonathan Villa
5 min read
-
Cloud SecurityJun 30, 2025
Cloud Data Security: Best Practices
Unlock the power of cloud data security: discover tips on access, monitoring, compliance, and more to keep your organization safe and thriving.
Daniel Miller
5 min read
-
AI Security Data SecurityJun 26, 2025
A Guide to AI Data Security: Why it Matters and How to Get it Right
Learn what AI data security really means, why it matters and how to protect sensitive data used by or exposed to AI systems and workflows.
Lexi Croisdale
8 min read
-
Varonis ProductsJun 26, 2025
What's New in Varonis: June 2025
Discover Varonis' latest features, including ChatGPT Enterprise monitoring, a Varonis MCP Server, MPIP labeling in Box, and more.
Nathan Coppinger
2 min read
-
Threat ResearchJun 26, 2025
Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails
Varonis Threat Labs uncovered a phishing campaign with M365's Direct Send feature that spoofs internal users without ever needing to compromise an account.
Tom Barnea
5 min read
-
Cloud Security DSPMJun 25, 2025
A DSPM-First Approach to Kubernetes Security
Unlock true Kubernetes security with DSPM to discover, classify, and protect sensitive data where CSPM falls short.
Daniel Miller
3 min read
-
Cloud Security Threat ResearchJun 19, 2025
Why Kerberoasting Still Matters for Security Teams
Sometimes the old ones are best... avoided. Explore Kerberoasting and how it remains a relevant attack method.
Simon Biggs
3 min read
-
AI Security Data SecurityJun 19, 2025
AI Model Poisoning: What You Need to Know
Explore the growing threat of model poisoning, a cyberattack where machine learning models are manipulated, and how your organization can defend against it.
Jonathan Villa
3 min read
-
Threat ResearchJun 18, 2025
The Jitter-Trap: How Randomness Betrays the Evasive
Discover how Varonis researchers detect stealthy beacon traffic by analyzing jitter patterns, turning evasion tactics into powerful behavioral detection signals.
Masha Garmiza
6 min read
-
AI Security Data Security Varonis ProductsJun 17, 2025
Introducing Varonis for ChatGPT Enterprise
Varonis' industry-leading Data Security Platform supports OpenAI’s ChatGPT Enterprise, keeping data safe against risks of AI misuse and exposure.
Shawn Hays
2 min read
-
Cloud SecurityJun 12, 2025
Multi Cloud Security: Challenges and How to Solve Them
Uncover powerful strategies to protect multi cloud setups. Solve fragmented visibility, inconsistent policies, growing attack surfaces, and compliance woes.
Daniel Miller
3 min read
-
Varonis ProductsJun 12, 2025
Streamline Entitlement Management with Varonis
Streamline access requests, automate entitlement reviews, support just-in-time access, enforce least privilege, and reduce IT burden with Varonis.
Nathan Coppinger
2 min read
-
AI SecurityJun 12, 2025
EchoLeak in Microsoft Copilot: What it Means for AI Security
A critical vulnerability in Microsoft 365 Copilot exposes the risks of unsecured AI agents and why a data-centric approach is crucial for protection.
Lexi Croisdale
3 min read
-
Data Security FederalJun 11, 2025
A User Always Finds a Way: The Federal Security Dilemma
Our experts share how the road to data loss is usually paved with good intentions, and strategies for federal agencies to combat unintended mistakes.
Trevor Douglas
3 min read
-
AI SecurityJun 09, 2025
Introducing the Varonis MCP Server
The Varonis MCP Server simplifies how customers use AI tools and agents to execute complex workflows.
Nolan Necoechea
2 min read
-
Cloud Security DSPM Data SecurityJun 06, 2025
Is DSPM in the Cloud any Different?
Explore how DSPM evolves in the cloud, offering real-time visibility, automation, and compliance across dynamic, multicloud environments.
Daniel Miller
4 min read
-
Data Security Threat ResearchJun 05, 2025
Decoding ‘ClickFix’: Lessons from the Latest Browser-Based Phish
ClickFix tricks users into running malware via fake CAPTCHAs. Learn how this phishing tactic works — and how Varonis stops it cold.
Daniel Kelley
5 min read
-
Data Security Speed DataJun 04, 2025
When Ransomware Wreaks Havoc on Hospitals
Dayton Children's Hospital CIO J.D. Whitlock shares insights on cybersecurity in healthcare, including managing ransomware threats.
Megan Garza
1 min read
-
DSPMJun 04, 2025
Varonis Recognized as Gartner’s Customers’ Choice in DSPM for Second Consecutive Year
Varonis leads the DSPM market with more reviews than any other vendor, more verified five-star ratings, and the highest overall rating.
Avia Navickas
1 min read
-
Data SecurityJun 04, 2025
Why Data Security Starts With What You Can’t See
Discover the most overlooked gaps in data security strategies and how to close them with automation, visibility, and unified protection across platforms.
Jonathan Villa
6 min read
-
IdentityJun 03, 2025
Varonis Announces Identity Protection to Unite Identity and Data Security
Varonis fuses Identity Protection into its leading Data Security Platform for accelerated breach prevention.
Shawn Hays
3 min read
-
Data Security RansomwareJun 02, 2025
UEBA Emerges as Critical Defense in Coinbase MFA-Related Breach
Learn how UEBA can help defend against identity-based attacks like the recent Coinbase breach.
Daniel Miller
2 min read
-
Threat ResearchMay 30, 2025
Scattered Spider: What You Need to Know
Get details on a prominent threat group and defensive recommendations to keep your organization's sensitive data secure.
Joseph Avanzato
2 min read
-
Cloud SecurityMay 30, 2025
The Role of Telemetry in Cloud Security: Unlocking the Secrets of the Cloud
Discover how telemetry enhances cloud security by detecting threats, ensuring integrity, and enabling real-time monitoring across AWS, Azure, and GCP.
Daniel Miller
3 min read
-
Threat ResearchMay 30, 2025
Commvault Metallic 0-Day Breach: What Happened and What It Means
The Commvault Metallic breach highlights the importance of securing identities, vetting vendors, and enforcing strict access controls in the cloud.
Rob Sobers
2 min read
-
Data SecurityMay 29, 2025
3 Steps to Secure Your Snowflake Data
Discover the data security risks in Snowflake and learn specific tactics to ensure safe practices.
Eugene Feldman
6 min read
-
Varonis ProductsMay 29, 2025
What’s New in Varonis: May 2025
Discover Varonis' latest features, including Azure CIEM enhancements, expanded classification tagging support, and improved reporting.
Nathan Coppinger
2 min read
-
Threat ResearchMay 27, 2025
Breaking and Re-Entering: Anatomy of a Resilient M365 BEC Attack Leveraging Inbound Connectors
Varonis uncovered a BEC attack leveraging Microsoft 365 admin tools, revealing advanced attacker methodologies and exploitation of administrative privileges.
Paul Wang
4 min read
-
Data SecurityMay 23, 2025
UEBA Buyer's Guide: How to Choose the Right Solution
Understand the need for UEBA, the gaps it fills in the modern threat detection landscape, and the right ingredients for a strong solution.
Jonathan Villa
4 min read
-
IdentityMay 22, 2025
Varonis Named a Leader in GigaOm Radar for Identity Threat Detection and Response (ITDR)
We are excited to announce that Varonis has been recognized as a leader in the 2025 GigaOm Radar for Identity Threat Detection and Response (ITDR).
Shawn Hays
2 min read
-
Data SecurityMay 21, 2025
Gear Check: The Commanding Officer’s Guide to Data Security
Discover why commanders should expect their leaders to inspect, monitor, and secure every file as rigorously as every rucksack.
Jon Gordon
3 min read
-
AI Security Data SecurityMay 20, 2025
Data Security Report Reveals 99% of Orgs Have Sensitive Information Exposed to AI
Varonis' 2025 State of Data Security Report shares findings from 1,000 real-world IT environments to uncover the dark side of the AI boom and what proactive steps orgs can take to secure critical information.
Lexi Croisdale
1 min read
-
Featured FederalMay 19, 2025
Varonis Achieves FedRAMP® Moderate Authorization
Varonis is proud to achieve FedRAMP Moderate Authorization, highlighting our commitment to data security for federal agencies.
Trevor Brenn
3 min read
-
Cloud SecurityMay 13, 2025
Exploring Infrastructure as Code: A Technical Deep Dive
See how Infrastructure as Code (IaC) enhances security, streamlines operations, and optimizes infrastructure management.
Daniel Miller
2 min read
-
Data SecurityMay 07, 2025
DLP Solutions Need a Zero-Trust Renaissance
Adoption of AI applications has transformed how data flows in and out of the organization. DLP needs a zero-trust renaissance in a post-AI world.
Shawn Hays
6 min read
-
AI Security Cloud Security Microsoft 365May 07, 2025
Enhancing Proactive Security Across SaaS Applications
Discover powerful strategies to secure SaaS apps, Microsoft 365, and AI tools like Copilot. Uncover how to safeguard your data and elevate cloud security.
Daniel Miller
3 min read
-
Azure Threat ResearchMay 06, 2025
Does AZNFS SUID your needs? A Path to Root Privilege Escalation on Azure AI and HPC Workloads Using an Azure Storage Utility
Discover how a critical bug in AZNFS-mount could let attackers escalate privileges — and why updating to version 2.0.11 is vital for securing Azure Storage.
Tal Peleg
3 min read
-
Data Security Speed DataMay 05, 2025
The Superpower of GRC
Corey Reed, the Senior Director of Information Security for HD Supply, discusses the importance of governance, risk, and compliance.
Megan Garza
2 min read
-
Threat ResearchMay 02, 2025
One Small Click for an Admin, One Giant Breach for the Organization
Cyber attackers are targeting IT admins using clever SEO tricks to disguise malicious payloads to push these threats to the top of search results.
Varonis Threat Labs
5 min read
-
AI SecurityMay 02, 2025
AI Data Security: Hidden Risks
AI doesn't just consume data — it reshapes how it's accessed, shared, and exposed. Understanding what data security risks AI brings to your org is paramount.
Lexi Croisdale
7 min read
-
AI SecurityApr 29, 2025
Supercharging Threat Detection with Agentic AI
Varonis announces the introduction of agentic AI to enhance the efforts of our world-class experts to provide customers with 24x7 data defense.
Nolan Necoechea
2 min read
-
Data SecurityApr 28, 2025
Data Security is a Team Sport
A shared responsibility for securing sensitive data amongst teams is crucial for organizational success.
Matt Christensen
4 min read
-
AI SecurityApr 28, 2025
Introducing AI Security: Always-On AI Risk Defense
AI Security is part of a growing set of AI-powered features in Varonis’ Data Security Platform that make data security effortless
Nolan Necoechea
2 min read
-
Cloud SecurityApr 25, 2025
Unlocking the Secrets: Ransomware in AWS S3 with SSE-C Encryption
Uncover the secrets of ransomware attacks on AWS S3 with SSE-C encryption. Learn how to safeguard your cloud data from emerging threats.
Daniel Miller
4 min read
-
Varonis ProductsApr 24, 2025
What’s New in Varonis: April 2025
Discover Varonis' latest features, including Azure CIEM enhancements, expanded classification tagging support, and improved reporting.
Nathan Coppinger
2 min read
-
Microsoft 365 Threat ResearchApr 24, 2025
SessionShark Steals Session Tokens to Slip Past Office 365 MFA
Discover how phishing kits like SessionShark threaten MFA security and learn how Varonis AI-driven solutions proactively defend against advanced phishing attacks.
Daniel Kelley
4 min read
-
Threat ResearchApr 22, 2025
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.
Oren Bahar
12 min read
-
Data Security Varonis ProductsApr 21, 2025
Varonis Partners with Pure Storage to Protect Critical Data
Together, Varonis and Pure Storage enable customers to proactively secure sensitive data, detect threats, and comply with evolving data and AI privacy rules.
Nolan Necoechea
2 min read
-
Data SecurityApr 16, 2025
Varonis and Concentrix: Delivering Data Security for the AI Revolution
Varonis and Concentrix aim to help large enterprises implement and harness AI safely and effectively while protecting what matters most — data.
Lexi Croisdale
1 min read
-
Azure Threat ResearchApr 15, 2025
Burning Data with Malicious Firewall Rules in Azure SQL Server
Exploiting a security gap in firewall rule-naming can suddenly delete entire servers and targeted assets when combined with admin actions.
Coby Abrams
4 min read
-
Cloud Security Threat ResearchApr 15, 2025
Avoid Getting Burned: Identifying and Correcting Common Misconfigurations in Azure Networking and Firewalls
Misconstruing the nuances of Azure Networking and Firewalls can result in security gaps and data exposure.
Coby Abrams
4 min read
-
Cloud Security Ransomware Threat ResearchApr 10, 2025
RansomHub – What You Need to Know About the Rapidly Emerging Threat
RansomHub, the notorious ransomware group, has affected over 200 victims in industries such as IT, healthcare, finance, and more.
Joseph Avanzato
4 min read
-
Cloud Security Data SecurityApr 08, 2025
Data Discovery and Classification: The Importance of How Data is Scanned
Data discovery and classification are the foundations for DSPM and data security, but how your data is scanned is more important than you may think.
Nolan Necoechea
3 min read
-
AI Security Threat ResearchApr 07, 2025
Xanthorox AI — The Next Generation of Malicious AI Threats Emerges
Xanthorox AI is a modular, self-hosted Black-Hat AI tool for cybercrime. Varonis counters it with real-time detection of AI-driven email threats.
Daniel Kelley
3 min read
-
Azure Data Security IdentityApr 04, 2025
Introducing the Azure Access Graph to Find and Fix Cloud Security Issues
Full spectrum visibility into Azure data access, entitlements, and identities beyond CIEM and data discovery tools
Shawn Hays
2 min read
-
Data Security Speed DataApr 02, 2025
From Table Stakes to a Team Sport: Rethinking Cybersecurity
Hal Wing, Centuri's Cybersecurity Manager, debunks cybersecurity's nickname and shares the importance of embracing emerging technologies.
Megan Garza
2 min read
-
Data Security HealthcareApr 02, 2025
Data Breaches in Healthcare: Why Identity Protection and Data Security are More Important Than Ever
Our latest report shows a significant rise in healthcare data breaches, posing severe risks to patient privacy and organizational integrity.
Daniel Miller
1 min read
-
Varonis ProductsMar 27, 2025
What’s New in Varonis: March 2025
Discover Varonis' latest features, including new data governance, labeling, and AI security capabilities.
Nathan Coppinger
2 min read
-
Cloud SecurityMar 26, 2025
Navigating the Cloud: Kubernetes Trends in 2025
As 2025 unfolds, the world of cloud security and Kubernetes is rapidly transforming, presenting exciting new challenges and opportunities for growth.
Daniel Miller
3 min read
-
DSPM Data Security Microsoft 365Mar 25, 2025
The Folder Fallacy - Unmasking Hidden Permissions in Microsoft 365
With the passing of time, admins and users lose sight of inherited sharing from SharePoint sites and folders, and this lack of visibility creates data risk. This article discusses one such scenario known as the 'folder fallacy'.
Shawn Hays
3 min read
-
Cloud SecurityMar 20, 2025
Why Cloud Security Programs Fail
Unlock the secrets to robust cloud security. Learn how to tackle common challenges and protect your organization from data breaches and cyber threats.
Daniel Miller
4 min read
-
Cloud Security Data SecurityMar 19, 2025
Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened
Rippling, a leader in workforce management software, filed a lawsuit against its competitor, Deel, accusing it of planting a spy and exfiltrating customer and competitive information. This blog unpacks how it happened and how it could have been prevented.
Shawn Hays
5 min read
-
Varonis ProductsMar 19, 2025
Streamline Data Governance with Varonis Data Lifecycle Automation
Automatically enforce data governance, lifecycle, and compliance policies without writing any code. Seamlessly copy and move data—cross-domain or cross-platform—without the risk of breaking permissions or interrupting business.
Nathan Coppinger
4 min read
-
Cloud Security Varonis ProductsMar 17, 2025
Varonis Acquires Cyral to Reinvent Database Activity Monitoring
Strategic DAM acquisition accelerates our mission to deliver AI-powered data security for all data, everywhere.
Yaki Faitelson
2 min read
-
AI Security Cloud Security Data Security FederalMar 12, 2025
Federal Data Security Challenges in the Age of AI
Insights from Varonis' Craig Mueller's on the rise in AI and the need for data security in the public sector.
Craig Mueller
3 min read
-
Cloud Security Data Security Ransomware Threat ResearchMar 12, 2025
Mind Games: How Social Engineering Tactics Have Evolved
Instead of using advanced tools or complex scripts, skilled threat actors infiltrate systems and steal data using the most effective weapon of all — words.
Varonis Threat Labs
7 min read
-
Threat ResearchMar 05, 2025
Salt Typhoon: The Threat Group Behind Major Cyberattacks
Varonis Threat Labs profiles Salt Typhoon, an APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
Joseph Avanzato
5 min read
-
Data Security HealthcareMar 05, 2025
Data Governance in Healthcare
With massive amounts of healthcare data and life-or-death scenarios depending on accurate information, a solid data governance policy is critical.
Daniel Miller
4 min read
-
Data Security Salesforce Varonis ProductsMar 05, 2025
Varonis Delivers Market-leading Salesforce Security Including Agentforce Coverage
Varonis eliminates risks, finds and remediates exposure, and detects anomalous behavior with the most complete Salesforce security product on the planet.
Eugene Feldman
8 min read
-
Data SecurityMar 04, 2025
Varonis Named a Leader and Customer Favorite in The Forrester Wave™: Data Security Platforms, Q1 2025
Varonis is recognized in The Forrester Wave™ for its strongest Current Offering and Strategy, receiving more 5/5 scores than any vendor evaluated.
Avia Navickas
2 min read
-
AI Security Data SecurityMar 03, 2025
AI Security: Frequently Asked Questions for 2025
AI-related questions and answers for business leaders. If you're trying to build more productive and secure AI strategies, these are the FAQS for you.
Shawn Hays
12 min read
-
Cloud SecurityFeb 28, 2025
Overcoming Cloud Security Challenges: Key Risks and Threats
Moving to the cloud brings several benefits, but it also means dealing with new security issues.
Daniel Miller
5 min read
-
Varonis ProductsFeb 27, 2025
What’s New in Varonis: February 2025
Discover Varonis' latest features, including automated Google Workspace labeling, Azure Blob exposure remediation, Entra ID group remediation, and more.
Nathan Coppinger
2 min read
-
Data SecurityFeb 26, 2025
Varonis Opens Data Centers in India to Support Expanding Customer Base and Minimize Cloud Data Risk
Varonis' newest international data centers in India help customers comply with local regulatory frameworks and data privacy sovereignty rules.
Megan Garza
1 min read
-
Cloud SecurityFeb 26, 2025
Understanding Cloud Governance: A Comprehensive Guide
In the rapidly evolving digital landscape, cloud governance has emerged as a crucial framework for organizations using cloud technologies.
Daniel Miller
3 min read
-
Cloud SecurityFeb 24, 2025
What is Cloud Security?
The risks associated with cloud environments are only growing. This blog highlights the basics of cloud security to secure data in the cloud.
Daniel Miller
4 min read
-
Threat ResearchFeb 13, 2025
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and Third-Party Logins
Discover how Astaroth phishing kits bypass security, offer bulletproof hosting, and how Varonis protects businesses from advanced cyber threats.
Daniel Kelley
2 min read
-
AI Security AgentforceFeb 11, 2025
3 Steps to Get Ready for Agentforce
Discover the risks of enabling Agentforce without proper data security and learn specific tactics to ensure a safe deployment.
Eugene Feldman
4 min read
-
AI Security Data SecurityJan 31, 2025
DeepSeek Discovery: How to Find and Stop Shadow AI
Understand the security implications of employees using DeepSeek, such as shadow AI, and how your organization can immediately mitigate risks.
Rob Sobers
2 min read
-
Varonis ProductsJan 30, 2025
What’s New in Varonis: January 2025
Discover Varonis' latest features, including recommendations for right-sizing access in AWS, new M365 remediation policies, and enhanced search management.
Nathan Coppinger
2 min read
-
Threat ResearchJan 29, 2025
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Discover how the Devil-Traff bulk SMS platform fuels phishing attacks with spoofing and automation.
Daniel Kelley
2 min read
-
Cloud Security RansomwareJan 28, 2025
Ransomware Targets AWS S3 Buckets: How to Prevent Encryption Without Recovery
A new ransomware threat is targeting users of AWS S3 Buckets, which could be a lose-lose scenario for unprotected organizations.
Daniel Miller
2 min read
-
Data Security Healthcare Privacy & ComplianceJan 27, 2025
Decoding Proposed Changes to the HIPAA Security Rule
Learn about recommended changes to the HIPAA Security Rule in the latest Notice of Proposed Rulemaking (NPRM) and discover how health organizations will be impacted.
Shawn Hays
5 min read
-
Data SecurityJan 22, 2025
Shifting the Paradigm: Why Data Security is Finally Taking Center Stage
Craig Mueller, VP of Federal at Varonis, compares how cybersecurity trends have evolved over time and why data should remain at the top of the list.
Craig Mueller
3 min read
-
Data Security Speed DataJan 22, 2025
Speed Data: Navigating Insurance Technology With Ralph Severini
The AWS leader discusses generative AI's future and his role in stopping the first cybercriminal.
Megan Garza
2 min read
-
Cloud Security Data SecurityJan 21, 2025
Varonis Once Again Named a Leader in GigaOm Radar for Data Security Platforms
GigaOm, a leading analyst firm, recognizes Varonis for behavioral analytics, access security, service integration, & continued innovation in AI & automation.
Nolan Necoechea
2 min read
-
Cloud SecurityJan 15, 2025
Change These 7 Security Settings After Creating a New AWS Account
Take these immediate actions to enhance your security posture significantly when creating a new AWS account.
Lexi Croisdale
8 min read
-
AI Security Email SecurityJan 13, 2025
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Learn how a lightning-fast phishing attack mimicking Black Basta tactics was quickly stopped by Varonis Interceptor.
Stephen Kowski
4 min read
-
Data Security Speed DataJan 09, 2025
Speed Data: Iron-Clad Security With Aaron Ansari
Aaron Ansari, virtual CISO of Exela Pharma Sciences, shares his insights on proactive planning, organizational control, and what it takes to be an Ironman.
Megan Garza
2 min read
-
Threat ResearchJan 06, 2025
Meet PhishWP — The New WordPress Plugin That’s Turning Legit Sites into Phishing Traps
Discover how PhishWP, a malicious WordPress plugin, turns trusted sites into phishing traps and how to protect yourself with Varonis.
Daniel Kelley
3 min read
-
Cloud SecurityJan 02, 2025
What is S3 Bucket Namesquatting, and How Do You Prevent It?
This blog examines AWS S3 bucket namesquatting, methods to address the issue, and how Varonis can prevent this and other data security problems in AWS.
Nolan Necoechea
3 min read
-
Data Security Varonis ProductsDec 20, 2024
How Varonis Improves Data Security with Automated Labeling
Discover the power of Varonis' automated labeling and how it can be an important element in securing your sensitive data.
Nolan Necoechea
4 min read
-
Varonis ProductsDec 19, 2024
What’s New in Varonis: December 2024
Discover Varonis' latest features, including support for Databricks and ServiceNow, automated threat responses, and more.
Nathan Coppinger
1 min read
-
Data Security Varonis ProductsDec 18, 2024
What Is Data Masking?
Learn what data masking is, why it matters, and how to automatically protect sensitive data in cloud databases using dynamic, policy-based masking techniques.
Nathan Coppinger
6 min read
-
Data Security IdentityDec 17, 2024
Why Identity is the Biggest Blind Spot in Data Security
Modern Data Security Platforms (DSP) must integrate identity risk and context for effective posture management, threat detection, and response.
Shawn Hays
3 min read
-
Cloud SecurityDec 16, 2024
Implementing AWS Resource Control Policies: Key Features and Benefits
AWS' new Resource Control Policies (RCPs) aim to improve control over resource access. However, organizations should approach implementation with caution.
Dubie Dubendorfer
2 min read
-
Cloud Security Data SecurityDec 16, 2024
AWS vs Azure vs Google: Cloud Services Comparison
This AWS vs Azure vs Google comparison evaluates these public cloud providers including pricing, computing, storage and other features.
Dubie Dubendorfer
6 min read
-
Data SecurityDec 13, 2024
Research Reveals 57% of Cyberattacks Start with Compromised Identity
Our latest research report examines cyberattacks reported in 2024, deep-diving into how they occurred, the consequences, and how you can protect your org.
Nolan Necoechea
2 min read
-
Cloud Security Varonis ProductsDec 12, 2024
Introducing Varonis for ServiceNow
Varonis now supports ServiceNow, enabling ServiceNow customers to secure their sensitive data, prevent breaches, and comply with regulations.
Nolan Necoechea
2 min read
-
Data SecurityDec 05, 2024
CISO Secrets: Building the Ultimate Security Plan for 2025
Learn why threats to the cybersecurity space might not be as advanced as they seem and gain strategic advice on developing your security plan.
Megan Garza
3 min read
-
Data Security Threat ResearchNov 26, 2024
Caught in the Net: Unmasking Advanced Phishing Tactics
Learn new, advanced phishing tactics being used by attackers and how your organization can combat them.
Tom Barnea
4 min read
-
Varonis ProductsNov 21, 2024
What’s New in Varonis: November 2024
Discover Varonis' latest features, including Google Cloud support, Database masking, AWS access graph, and more.
Nathan Coppinger
2 min read
-
Cloud Security Varonis ProductsNov 20, 2024
Introducing Varonis for Google Cloud
Varonis’ support for Google Cloud brings a unified and automated data security approach to major cloud providers.
Ellen Wilson
2 min read
-
Varonis ProductsNov 19, 2024
Varonis Integrates With MongoDB for Unmatched Data Visibility
Discover and classify sensitive data stored in MongoDB with pinpoint accuracy to properly identify and secure critical information.
Nathan Coppinger
2 min read
-
Data SecurityNov 19, 2024
38 Must-Know Healthcare Cybersecurity Stats
Cybersecurity in the healthcare sector is crucial. Learn strategies to strengthen your security posture with these insights.
Megan Garza
4 min read
-
Threat ResearchNov 14, 2024
Varonis Discovers New Vulnerability in PostgreSQL PL/Perl
Varonis discovered a vulnerability (CVE-2024-10979) in the Postgres trusted language extension PL/Perl that allows setting arbitrary environment variables in PostgreSQL session processes.
Varonis Threat Labs
2 min read
-
Cloud Security Varonis ProductsNov 13, 2024
Varonis Extends Industry-Leading Cloud Data Security to Azure Databases
Discover and protect critical data stored in Azure databases with Varonis' industry-leading cloud data security.
Nathan Coppinger
2 min read
-
Threat ResearchNov 12, 2024
GoIssue — The Tool Behind Recent GitHub Phishing Attacks
Discover how GoIssue targets GitHub users, posing significant risks to developers and organizations.
Daniel Kelley
2 min read
-
Active Directory Microsoft 365 Threat ResearchNov 10, 2024
New Organizational Messages Feature in Microsoft 365 a Potential Risk
The new organizational messages feature for Microsoft 365 enhances how IT and security teams communicate with users at scale, but also generates risks.
Shawn Hays
3 min read
-
Identity Varonis ProductsNov 06, 2024
Introducing the AWS Access Graph to Find and Fix Cloud Security Issues
Tighten your cloud security posture with the ability to automatically visualize the AWS blast radius and cut off access paths to data.
Nathan Coppinger
2 min read
-
Varonis ProductsOct 30, 2024
What's New in Varonis: October 2024
Discover Varonis' latest features, including new automated remediation policies, Box Zones support, autonomous database classification, and more.
Nathan Coppinger
1 min read
-
Data Security Speed DataOct 29, 2024
Speed Data: The Cyclical Nature of Data With Shesh Kondi
The Salesforce pro discusses how security has evolved and the surprising characteristic unique to the cybersecurity field
Megan Garza
2 min read
-
AI Security Data SecurityOct 22, 2024
Applying NIST CSF 2.0 to Microsoft 365 Copilot
Discover how to apply the new NIST CSF 2.0 to Microsoft 365 Copilot and how Varonis can help.
Shawn Hays
4 min read
-
Email SecurityOct 21, 2024
How Dark Web Anti-Bot Services Aid Phishing Campaigns
Explore novel anti-bot services advertised on the dark web, how they bypass Google's Red Page, and the issues security teams have in defending against them.
Daniel Kelley
4 min read
-
AI SecurityOct 17, 2024
How Tampa General Hospital Deployed Copilot Safely With Varonis
Discover how Tampa General Hospital safely deployed Microsoft 365 Copilot to tackle administrative tasks with Varonis.
Lexi Croisdale
2 min read
-
Data Security Speed DataOct 14, 2024
Speed Data: Protecting Private Healthcare Data With Doug Cox
The Salesforce leader emphasizes the importance of securing sensitive healthcare data
Megan Garza
2 min read
-
Data SecurityOct 03, 2024
31 Must-Know Education Cybersecurity Statistics
We’ve compiled the most important cybersecurity stats and trends regarding cybersecurity, so institutions can keep their sensitive data safe and secure.
Tomer Ronen
4 min read
-
Data Security Speed DataOct 02, 2024
Speed Data: The Dangers of Data Poisoning With Avi Yoshi
The Microsoft CTO discusses emerging threats and the challenges of cloud migration.
Megan Garza
2 min read
-
Cloud SecuritySep 30, 2024
Breaks in the Cloud: Protecting Against Top LLM Risks
Understand the risk of Large Language Models (LLMs) to your cloud security and why it's important to be cautious when adopting new technologies.
Megan Garza
3 min read
-
Threat ResearchSep 26, 2024
New CVEs in OpenPrinting CUPS Software
A series of vulnerabilities in OpenPrinting CUPS Software indicates an attack vector for RCE, one of the worst possible consequences for a vulnerability.
Varonis Threat Labs
3 min read
-
Varonis ProductsSep 25, 2024
What's New in Varonis: September 2024
Discover Varonis' latest features, including Salesforce high-risk permissions remediation, SIEM and ticketing integrations, and expanded database coverage.
Nathan Coppinger
1 min read
-
Data SecuritySep 20, 2024
The Attacker’s Playbook: Security Tactics from the Front Lines
Understand a threat actor's mindset to strengthen your security posture with mitigation tips from Varonis' forensic experts.
Lexi Croisdale
2 min read
-
Data Security Speed DataSep 19, 2024
Speed Data: The Basics of Cybersecurity With Mark Wigham
The Salesforce leader shares insights on DLP, supporting security teams, and essential cybersecurity principles
Megan Garza
2 min read
-
Salesforce Varonis ProductsSep 17, 2024
Varonis Enhances Salesforce Security With High-Risk Permissions Remediation
Identify and automatically remediate high-risk Salesforce permissions to reduce risk and improve your SaaS security posture.
Nathan Coppinger
1 min read
-
Threat ResearchSep 16, 2024
Data Theft in Salesforce: Manipulating Public Links
Varonis Threat Labs uncovered a vulnerability in Salesforce's public link feature that threat actors could exploit to retrieve sensitive data.
Nitay Bachrach
6 min read
-
Data Security Speed DataSep 12, 2024
Speed Data: Military Information Security With Mike Taylor
Mike Taylor, the Hospital Ship Joint Task Director at the U.S. Department of Defense, shares his responsibilities in securing the USNS Mercy and USNS Comfort and challenges the conventional views of military ships.
Megan Garza
3 min read
-
AI Security Salesforce Speed DataSep 09, 2024
Speed Data: Unpacking Gen AI With Yohan Kim
Yohan Kim, Distinguished Security Technical Architect for Salesforce, gives insight into AI functionality and customer sentiments on Varonis' Speed Data show.
Megan Garza
3 min read
-
DSPM Data SecuritySep 06, 2024
Data Security in the Cloud: Key Use Cases for DSPM
Discover the key use cases for data security posture management (DSPM) and why this framework is only one part of a holistic data security approach.
Nolan Necoechea
3 min read
-
Varonis ProductsSep 05, 2024
Protecting Salesforce: Remediating Misconfigured Sites
Varonis enables organizations to identify and remediate misconfigured Salesforce Site guest permissions that expose sensitive data publicly.
Nathan Coppinger
1 min read
-
Privacy & ComplianceAug 29, 2024
What The New SEC Cyber Disclosure Guidelines Mean For Your Business
Discover the challenges the new SEC cybersecurity guidelines present for your CISO and learn tips on how to handle them at your organization.
Yaki Faitelson
3 min read
-
Varonis ProductsAug 28, 2024
What’s New in Varonis: August 2024
Learn more about Varonis’ new AI data classification, EDR integrations, MDDR executive dashboard, Azure permissions analysis, and more.
Shane Walsh
2 min read
-
Cloud SecurityAug 22, 2024
AWS Misconfigurations Lead to Exposed Data
Discover how a recent data extortion campaign exposed sensitive files in thousands of AWS environments and what you can do to prevent it from happening to you.
Varonis Threat Labs
3 min read
-
Data Security Speed DataAug 21, 2024
Speed Data: Pentesting and Proactive Threat Hunting With Tim Callahan
Aflac CISO Tim Callahan shares his favorite aspects of cybersecurity and what challenges him the most.
Megan Garza
2 min read
-
AI Security Privacy & ComplianceAug 16, 2024
The EU AI Act: What it is and Why it’s Important
An overview of the world’s first comprehensive AI regulation, its compliance requirements, and how to prevent penalties of up to €35 million ($38 million).
Nolan Necoechea
3 min read
-
Varonis ProductsAug 07, 2024
Varonis Announces Integrations With SentinelOne and Microsoft Defender for Endpoint
Varonis now integrates with leading EDR providers Microsoft Defender for Endpoint and SentinelOne, expanding our MDDR visibility to customers’ endpoints.
Shane Walsh
1 min read
-
Data SecurityAug 06, 2024
Varonis Announces AI-Powered Data Discovery and Classification
Varonis' new LLM-driven data scanning gives customers a deeper business context with unmatched precision and scale.
Rob Sobers
3 min read
-
Varonis ProductsJul 25, 2024
What's New in Varonis: July 2024
Learn more about Varonis’ New NoSQL database support and expanded Salesforce exposure remediations.
Nathan Coppinger
2 min read
-
AI Security Data Security Speed DataJul 22, 2024
Speed Data: AWS, Gen AI, and SecDataOps With Jonathan Rau
The VP and Distinguished Engineer at Query explains what most organizations get wrong about cloud security.
Megan Garza
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital