Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

9 Infamous APT Groups: Fast Fact Trading Cards

Advanced Persistent Threat (APT) groups are widely classified as organizations that lead, “attacks on a country’s information assets of national security or strategic economic importance through either cyberespionage or cybersabotage.”...

Read More

Varonis eBook: WMI Events and Insider Surveillance

If you’ve been reading our blog, you know that Windows software can be weaponized to allow hackers to live-off-the-land and stealthily steal sensitive data. Insiders are also aware of the...

Read More

Ransomware Meets Its Match With Automated Cyber Defenses

The “good news” about hacking is that while leaving you with potentially enormous incident response costs — customer notifications, legal fees, credit monitoring, class-action suits — your business can still...

Read More

107 Must-Know Data Breach Statistics for 2020

As more and more companies experience crippling security breaches, the wave of compromised data is on the rise. Data breach statistics show that hackers are highly motivated by money to...

Read More

How to Use Microsoft Teams Safely: Security and Compliance Basics

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

What is OSINT?

As information becomes more available from a vast number of sources, skilled researchers can often find nearly any type of data they’re looking for, provided they know where to look....

Read More

Data Privacy Guide: Definitions, Explanations and Legislation

Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns...

Read More

What is CDM and How Does Varonis Help?

The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...

Read More

What is PGP Encryption and How Does It Work?

Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto...

Read More

Hacking Wi-Fi With the ESP8266

The ESP8266 microcontroller is a cheap, powerful IoT module with embedded Wi-Fi, which can be programmed in a number of popular languages. On the Security Tools podcast, we explore some...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.