Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Sarah Hospelhorn

Solving The Cybersecurity Skills Shortage Within Your Organization

It’s simple economics: supply and demand. A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses....

Read More

Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors

Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....

Read More

How Varonis Helps with Email Security

Email is one of the most common points of entry for malware (at over 94%) and phishing emails are on the rise, costing companies an average of $1.6 million. Compromised...

Read More

The Future of Cybersecurity Budgeting

Major data breaches from the past few years are reminders that cybersecurity can’t remain an afterthought when it comes to budgeting priorities. The threat landscape is expanding and the likelihood...

Read More

New Classification Patterns for the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) becomes law on January 1, 2020. To help organizations get ready, we’re introducing new CCPA classification capabilities. Varonis customers can now automatically discover and...

Read More

Analyzing Company Reputation After a Data Breach

The period following a data breach is not an easy one for companies. Lots of time and money are spent to effectively manage a crisis, with even more time and...

Read More

Varonis Version 7 Highlights

Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new. 25 new widgets to manage and protect...

Read More

Browsing Anonymously: Is It Really Anonymous?

Privacy is top of mind for many people these days. Unclear privacy policies, rampant data collection and high-profile data breaches can lead us to second guess our information’s safety —...

Read More

Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation

Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...

Read More

Hacker Motives: Red Flags and Prevention

Hackers are getting savvier. They’re constantly finding new ways to abuse system vulnerabilities and sneak into our networks. The worst part? The likelihood of a cyber attack is now higher...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.