Latest articles
![](https://info.varonis.com/hubfs/Copy%20of%20ProductNewsletter_BlogHeader%20%281%29.png)
What's New in Varonis: May 2024
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
May 30, 2024
Varonis brings a UI refresh, easier policy management, expanded automated remediation capabilities in AWS, automation rollback, and privacy automation.
![What's New in Varonis: April edition](https://info.varonis.com/hubfs/ProductNewsletter_BlogHeader_April.png)
What's New in Varonis: April 2024
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Apr 30, 2024
Learn more about Varonis for Microsoft 365 Copilot, new security posture reporting, and more about our new MDDR service.
![DSPM radar surfacing findings. Varonis also shows how to fix them.](https://info.varonis.com/hubfs/Blog_DSPM_BlogHero_202402_V1.png)
DSPM Report Highlights Risks That Lead to Significant Data Breaches
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Feb 14, 2024
Varonis' new DSPM report reveals that typical companies are widening their blast radius by oversharing permissions, excess ghost users, lack of MFA, and more.
![cybersecurity maturation model certification](https://info.varonis.com/hubfs/Blog_CMMC2_202309_V1.png)
Cybersecurity Maturation Model Certification 2.0: How Varonis Ensures Certification for Defense Contractors
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Oct 05, 2023
Varonis can help you achieve compliance and implement the Cybersecurity Maturity Model Certification 2.0 (CMMC) program to safeguard cybersecurity across the government’s DIB.
![three ways Varonis fights insider threats](https://info.varonis.com/hubfs/Blog_ThreeWaysVaronisFightsInsiderRisk_202309_FNL.png)
Three Ways Varonis Helps You Fight Insider Threats
![Shane Walsh](https://info.varonis.com/hubfs/Brand_Template_AuthorPhoto_Walsh_2023_FNL.png)
Sep 02, 2023
Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.
Try Varonis free.
Deploys in minutes.