Articles by
Sarah Hospelhorn

Based in Brooklyn, NY, Sarah focuses on the strategy behind solving problems in data security. She’s been in tech for over 20 years, with experience in software, hardware, and cryptography.
Solving The Cybersecurity Skills Shortage Within Your Organization
It’s simple economics: supply and demand. A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses....
Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors
Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....
How Varonis Helps with Email Security
Email is one of the most common points of entry for malware (at over 94%) and phishing emails are on the rise, costing companies an average of $1.6 million. Compromised...
The Future of Cybersecurity Budgeting
Major data breaches from the past few years are reminders that cybersecurity can’t remain an afterthought when it comes to budgeting priorities. The threat landscape is expanding and the likelihood...
New Classification Patterns for the California Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA) becomes law on January 1, 2020. To help organizations get ready, we’re introducing new CCPA classification capabilities. Varonis customers can now automatically discover and...
Analyzing Company Reputation After a Data Breach
The period following a data breach is not an easy one for companies. Lots of time and money are spent to effectively manage a crisis, with even more time and...
Varonis Version 7 Highlights
Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new. 25 new widgets to manage and protect...
Browsing Anonymously: Is It Really Anonymous?
Privacy is top of mind for many people these days. Unclear privacy policies, rampant data collection and high-profile data breaches can lead us to second guess our information’s safety —...
Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation
Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...
Hacker Motives: Red Flags and Prevention
Hackers are getting savvier. They’re constantly finding new ways to abuse system vulnerabilities and sneak into our networks. The worst part? The likelihood of a cyber attack is now higher...