Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Sarah Hospelhorn

Cryptolocker, lockouts and mass deletes, oh my!

DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your...

Read More

DatAlert Analytics and the Varonis Behavior Research Laboratory

Last November, we introduced Varonis UBA threat models to automatically analyze behavior and detect insider threats throughout the lifecycle of a breach.  Our UBA threat models, which are major enhancements...

Read More

Anatomy of a breach: Sony

Our new UBA Threat Models are built on a kill chain, in order to protect your data throughout the entire life cycle of a data breach. But what does that...

Read More

How to track Active Directory KPIs for the C-level

As the main identity and access hub, Active Directory has a central role in the IT infrastructure of nearly every organization.  AD manages and authenticates user accounts, which are referenced...

Read More

Introducing Varonis UBA Threat Models

If you’re a regular reader of our blog, you know that we feel that the perimeter is dead, and that the battle against insider (and outsider) threats is won with...

Read More

Inside Out Security

Data breaches are making headlines more frequently than ever.  Who’s going to be next? It’s time to protect your data from the inside out.  Find out how in our latest...

Read More

Migrating Your Data to Office 365

What do I need to know before moving to Office 365? Moving your company’s data to cloud-based storage is a big job, and we want to make sure you understand...

Read More

Varonis + Office 365

Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.