Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Rob Sobers

Latest articles

8 Things to Look for in File Auditing Software

Rob Sobers

Rob Sobers

Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.

What is Human Generated Data?

Rob Sobers

Rob Sobers

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

The Dangers of Shared Links

Rob Sobers

Rob Sobers

Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs.  These URLs, often called “external links” or “shared links,” are a...

4 Secrets for Archiving Stale Data Efficiently

Rob Sobers

Rob Sobers

In order for organizations to find an effective solution to help deal with stale data and comply with defensible disposition requirements, there are 4 secrets to efficiently identify and clean-up stale data...

The Definitive Guide to Cryptographic Hash Functions (Part II)

Rob Sobers

Rob Sobers

Last time I talked about how cryptographic hash functions are used to scramble passwords.  I also stressed why it is extremely important to not be able to take a hash...

Lessons Learned from Mat Honan's Epic Hacking

Rob Sobers

Rob Sobers

” Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.” If you haven’t read Gizmodo writer Mat Honan’s...

The Definitive Guide to Cryptographic Hash Functions (Part 1)

Rob Sobers

Rob Sobers

Give me any message and I will create a secret code to obscure it. Try it! “This really opened my eyes to AD security in a way defensive work never...

The Difference Between Everyone and Authenticated Users

Rob Sobers

Rob Sobers

In order to maintain proper access controls, it’s crucial to understand what every entity on an access control list (ACL) represents, including the implicit identities that are built into a...

Data Classification Tips: Finding Credit Card Numbers

Rob Sobers

Rob Sobers

Data classification is a critical piece of the data governance puzzle.  In order to be successful at governing data, you have to know—at all times—where your sensitive data is concentrated,...

Exchange Journaling and Diagnostics: How to

Rob Sobers

Rob Sobers

Journaling and Diagnostics Logging are services to monitor and audit activity on Microsoft Exchange servers. They provide basic auditing functionality for email activity (e.g. who sent which message to whom)...

5 Things You Should Know About Big Data

Rob Sobers

Rob Sobers

Big data is a very hot topic, and with the Splunk IPO last week seeing a 1999-style spike, the bandwagon is overflowing.  We’re poised to see many businesses pivoting into...

What is OAuth? Definition and How it Works

Rob Sobers

Rob Sobers

OAuth (Open Authentication) is an open-standard authorization protocol or framework that provides applications the ability for “secure designated access.” It is a way for users to grant websites or applications access to their information without giving away their passwords.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.