Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

David Gibson

DHS Emergency Directive 19-01: How to Detect DNS Attacks

On January 22, 2019, the United State Department of Homeland Security (DHS) released a warning for a DNS infrastructure hijacking attack against US government agencies. Let’s dig into the specifics...

Read More

Our 2018 Cybersecurity Predictions

Looking back, 2017 had all the twists and turns of a good disaster movie. Hackers steal and leak the NSA’s powerful exploit kit that’s then unleashed on the world through...

Read More

4 Step Guide to Managing Network Share Permissions

Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics...

Read More

New Survey Places Varonis among Readers’ Top Choices for Data Loss Prevention

Varonis was recently named a “Readers’ Top Five” pick for Data Loss Prevention (DLP) solutions in a newly released survey of nearly 5,000 TechTarget readers. The survey respondents are IT...

Read More

Six IT Predictions for 2016

Hillary Clinton’s private email server has already brought cybersecurity into the U.S. Presidential race. In 2016, a cyberattack will strike the campaign, causing a major data breach that will expose...

Read More

Varonis Named “Representative Vendor” in Gartner’s New Market Guide for User and Entity Behavior Analytics

Today we’re pleased to share that we’ve been named a “Representative Vendor” in Gartner’s brand new Market Guide for User and Entity Behavior Analytics (UEBA) that highlights the advantages of...

Read More

How to Detect and Clean CryptoLocker Infections

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops...

Read More

PCI DSS Explained: Our New White Paper Decodes the Complexity

The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide...

Read More

Tips From the Pros: Sharing 250 Million Folders With 100,000 Users

Q: How many users and how much data are you managing? We have in excess of 100,000 actual people, 1.5 million accounts in AD, and 250,000,000 data folders. Q: Can...

Read More

Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data

In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.