Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

DNS Security Guide

DNS security should be considered an essential part of any business’s security plan. Name resolution services (translating hostnames into IP addresses) are used by nearly all applications and services on...

Read More

SharePoint Online Security: Best Practices and Audit Tips

SharePoint Online is a powerful cloud-based service from Microsoft that allows your team to share Office 365 files and data. Many companies are now migrating from on-premises Office 365 installations...

Read More

Data Privacy Resource Center

Data privacy and compliance is a crucial subject for every company working with user data. Depending on your company, how you work with data, and who you collect data on,...

Read More

Introducing the Varonis Remote Work Update

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

Read More

SharePoint vs. SharePoint Online: Full Comparison

SharePoint is a workplace collaboration system built by Microsoft and used for file sharing in Office 365, document management, messaging, and for its ability to produce statistics on how business...

Read More

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Ensuring that your Azure cloud service is compliant with the regulations that cover customer data can be complex. Each set of regulations – HIPAA, PCI, GDPR, and the CCPA –...

Read More

COVID-19 Threat Update #6

Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...

Read More

COVID-19 Threat Update #5

The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...

Read More

Hackers Take Aim at Home WiFi Networks

Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.