Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

PowerShell for Pentesters: Scripts and Tips

In case you haven’t noticed, we’ve been championing PowerShell as a pen testing tool in more than a few blog posts. One big reason to learn PowerShell and use it...

Read More

2019 Data Risk Report Stats and Tips You Won’t Want to Miss

Each year, Varonis conducts thousands of data risk assessments for organizations that want a clearer picture of their security posture and develop a roadmap to reducing risk to sensitive data....

Read More

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

You may have heard that Microsoft changed their guidance on password expiration policies. On May 23, 2019, they released a blog post explaining their decisions. As cybersecurity experts already know,...

Read More

A Quick Dip into Event Query Language (EQL)

Did you ever have the urge to put together a few PowerShell scripts leveraging the Windows Management Interface (WMI) to create your own file security monitoring package? My advice: wait...

Read More

What is Zero Trust? A Security Model

Zero Trust is a security model developed by former Forrester analyst John Kindervag in 2010. Since then, Zero Trust has become one of the more popular frameworks in cybersecurity. Recent...

Read More

Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors

Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....

Read More

How Varonis Helps with Email Security

Email is one of the most common points of entry for malware (at over 94%) and phishing emails are on the rise, costing companies an average of $1.6 million. Compromised...

Read More

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Read More

7 Key Risk Indicators in the Varonis Active Directory Dashboard

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Read More

Security Risk Analysis Is Different From Risk Assessment

At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.