Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Nathan Coppinger

INVEST in America Act: Billion-Dollar Funding for Cybersecurity

The INVEST in America Act, which Congress is seeking to pass, provides nearly two billion dollars in funding to enhance the nation’s cybersecurity. Who should care? State, local, and tribal...

Read More

Varonis extends security capabilities to Nutanix Files

The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis...

Read More

Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS

Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and...

Read More

Attack lab: Spear Phishing with Google Drive Sharing

Phishing scams are as old as the internet—tricking victims into divulging important information about themselves and their accounts. These scams are so common that all of the major email providers...

Read More

Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365

The transition to remote work over the last year has exponentially increased the usage of Microsoft 365’s collaboration tools. One look at the massive spike in daily active users for...

Read More

The Complete Guide to Phishing Attacks

Phishing attacks have been a plight on individuals and organizations since the invention of email. As of late, these attacks have become more sophisticated and challenging to detect. Phishing attacks...

Read More

Netwalker Ransomware Guide: Everything You Need to Know

Emotet, Trickbot, Maze, Ryuk, and now Netwalker ransomware— cybercrime has increased exponentially in the last year. Ransomware has been a serious plight across industries big and small, public and private,...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.