Latest articles
![shield with person attempting to infiltrate it, depicting AI security risks](https://info.varonis.com/hubfs/Blog_GenerativeAISecurity_BlogHero_202404_V1.png)
AI at Work: Three Steps to Prepare and Protect Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Oct 31, 2023
Discover how your business can prepare and protect your sensitive data from the risks that generative AI presents.
![](https://info.varonis.com/hubfs/Blog_InsiderThreat_202307_FNL.png)
Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Aug 02, 2023
This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.
![](https://info.varonis.com/hubfs/Blog_WhatAutomationMeansforCybersecurity_BlogHero_202303_FNL.png)
What Automation Means For Cybersecurity—And Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
May 03, 2023
This article explains how automation can help turn the right information into action, helping to defend against cyberattacks, mitigate risk, shore up compliance and improve productivity.
![](https://info.varonis.com/hubfs/Blog_ForbesOct_202211_FNL-01.png)
Four Must-Know Cyber Tips for Your Business
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Dec 01, 2022
The real story behind today’s breaches is never about an isolated bad decision—it’s about the many decisions made long before a sleepy network administrator gets a call from an attacker.
![](https://info.varonis.com/hubfs/Blog_Forbes-SalesData_BlogHero_202208_FNL.png)
Your Sales Data Is Mission-Critical: Are You Protecting It?
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Aug 18, 2022
If you’re like many executives, you might assume your data is secure within those cloud applications. That’s a dangerous assumption, though. Cloud providers are responsible for everything that delivers their application (e.g., their data center); it’s your responsibility to protect the data inside it.
![](https://info.varonis.com/hubfs/Blog_Hero_CybersecurityLeader_72dpi_202202_FNL-1.png)
Why Every Cybersecurity Leader Should ‘Assume Breach’
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
May 16, 2022
Any system, account or person at any time can be a potential attack vector. With such a vast attack surface, you need to assume attackers will breach at least one vector.
![](https://info.varonis.com/hubfs/ModernRansomwareAttacks-hero.png)
What Every CEO Should Know About Modern Ransomware Attacks
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Jan 24, 2022
How To Make Yourself A Tougher Cybersecurity Target
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Imported_Blog_Media/cloud-applications-hero.png)
Cloud Applications Put Your Data At Risk - Here's How To Regain Control
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Nov 05, 2021
Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk. Your data is in more places...
![](https://info.varonis.com/hubfs/Imported_Blog_Media/varonis-think-your-data-is-secure-hero-01-1.png)
Think Your Data Is Secure? Three Questions You Need To Answer Right Now
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Aug 11, 2021
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/dawn-of-the-4-minute-cyberattack-hero-v2.png)
The Dawn Of The Four-Minute Cyberattack: Four Steps To Protect Your Company
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
May 26, 2021
Attack chains that were once only theoretical are now a reality. SolarWinds was the Roger Bannister of cyberattacks — now that we’ve had one breakthrough, we will have others.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/Blog_VaronisUpdate_202010_FNL.png)
Polyrize Acquisition
![Yaki Faitelson](https://info.varonis.com/hubfs/yaki-faitelson.jpg)
Oct 26, 2020
I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.
Try Varonis free.
Deploys in minutes.