Data Security
Articles
Explore by topic:
Government Hacking Exploits, Examples and Prevention Tips
Government hacking exploits, unfortunately, pose a very real threat for organizations of all kinds, and those of us working in cybersecurity need to be aware of it. A decade ago,...
Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software
Varonis received the Gartner Peer Insights Customers’ Choice distinction for the File Analysis Software market. We’re particularly proud of this recognition because it is 100% based on customer feedback. Thank...
What is Data Classification? Guidelines and Process
Imagine you’re the CISO of a 10,000-person organization where users create millions of files and emails each day. Some of that information is highly sensitive—if leaked or stolen, you’re facing...
DNS Security Guide
DNS security should be considered an essential part of any business’s security plan. Name resolution services (translating hostnames into IP addresses) are used by nearly all applications and services on...
What is DNS TTL + Best Practices
DNS TTL (time to live) is a setting that tells the DNS resolver how long to cache a query before requesting a new one. The information gathered is then stored...
Introducing the Varonis Remote Work Update
The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...
The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA
Ensuring that your Azure cloud service is compliant with the regulations that cover customer data can be complex. Each set of regulations – HIPAA, PCI, GDPR, and the CCPA –...
COVID-19 Threat Update #6
Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...
COVID-19 Threat Update #5
The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...
Hackers Take Aim at Home WiFi Networks
Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...