Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Sarah Hospelhorn

The Future of Cybersecurity Budgeting

Major data breaches from the past few years are reminders that cybersecurity can’t remain an afterthought when it comes to budgeting priorities. The threat landscape is expanding and the likelihood...

Read More

New Classification Patterns for the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) becomes law on January 1, 2020. To help organizations get ready, we’re introducing new CCPA classification capabilities. Varonis customers can now automatically discover and...

Read More

Analyzing Company Reputation After a Data Breach

The period following a data breach is not an easy one for companies. Lots of time and money are spent to effectively manage a crisis, with even more time and...

Read More

Varonis Version 7 Highlights

Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new. 25 new widgets to manage and protect...

Read More

Browsing Anonymously: Is It Really Anonymous?

Privacy is top of mind for many people these days. Unclear privacy policies, rampant data collection and high-profile data breaches can lead us to second guess our information’s safety —...

Read More

Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation

Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...

Read More

Hacker Motives: Red Flags and Prevention

Hackers are getting savvier. They’re constantly finding new ways to abuse system vulnerabilities and sneak into our networks. The worst part? The likelihood of a cyber attack is now higher...

Read More

Varonis Version 7.0

Version 7.0 of the Varonis Data Security Platform is here – featuring new cloud support and advanced threat detection and response capabilities: new event sources and enrichment; out-of-the-box threat intelligence applied to...

Read More

What Would The World’s Data Look Like if it Were Physical?

We take well over a trillion photographs a year, upload hundreds of hours of video a minute, and commit search queries tens of thousands of times per second. The sheer...

Read More

California Consumer Privacy Act (CCPA) vs. GDPR

Data privacy laws are fast becoming a primary element in any data security conversation: from the EU’s GDPR to the California Consumer Privacy Act to Japan’s Act on the Protection...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.