Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Defend Against Ransomware with the NIST Ransomware Profile

Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry. The FBI’s Internet Crime Complaint Center reported 2,084 ransomware complaints from January to...

Read More

Threat Update 66 – Not The “Cloud Solution” You Are Expecting

To celebrate Thanksgiving in the U.S., Kilian and Ryan discuss a solution that contains the closest thing they can find to actual tiny clouds, as well as additional elements necessary...

Read More

Threat Update 65 – What is Cloud Security Posture Management (CSPM)?

Organizations face big challenges selecting the right solutions when crafting a layered approach to cloud security – especially with the alphabet soup of options and acronyms out there. Kilian and...

Read More

How to Monitor Network Traffic: Effective Steps & Tips

No matter how communications and information technology evolves, data in motion will always exist. Hackers will always target the main arteries and thoroughfares of data flow, so monitoring network traffic...

Read More

What is a Security Operations Center (SOC)?

With cyberattacks and data breaches on the rise, companies of all sizes need to place an emphasis on securing their technology assets. However, assembling a full-time in-house IT security team...

Read More

Role-Based Access Control (RBAC)

Organizations of all sizes are worried about securing their IT investments and a key part of this is providing users limited access only to the resources that they need to...

Read More

Threat Update 64 – Escaping Einstein’s Wormhole

Salesforce’s Einstein Activity Capture (EAC) is a convenient, automated way to boost your sales team’s productivity by consolidating relevant customer emails, and meetings into a central system – Salesforce. However,...

Read More

Cloud Applications Put Your Data At Risk — Here’s How To Regain Control

Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they’re also a big, growing risk. Your data is in more places...

Read More

Threat Update 63 – Moving To The Cloud Doesn’t Mean You Don’t Own The Data Risk

Leveraging cloud solutions can alleviate some legacy infrastructure risks but can bring data protection challenges to the forefront. Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team discuss...

Read More

Update 62 – SaaS Authentication Monitoring Evasion

Businesses know they need to monitor their SaaS apps, but it’s easy to get lulled into a false sense of security if you’re relying on authentication monitoring as your only...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.