Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

Everything You Need to Know About Cyber Liability Insurance

Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity...

Read More

81 Ransomware Statistics, Data, Trends and Facts for 2021

Ransomware is a form of malicious software that infiltrates a computer or network and limits or restricts access to critical data by encrypting files until a ransom is paid.  Ransomware...

Read More

Your Guide to Salesforce Data Protection

That is the approximate cost of a data breach on any business worldwide in 2020. The number increases to 8.64 million dollars in expenses in the United States alone. Let...

Read More

ReConnect – Meet DatAdvantage Cloud

Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom! Kilian Englert and Ryan O’Boyle...

Read More

SIEM Tools: 9 Tips for a Successful Deployment

Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the...

Read More

Azure Bicep: Getting Started and How-To Guide

Are you deploying resources to Azure and trying to use Azure Resource Manager (ARM) templates? Are you finding the JSON syntax confusing? Microsoft heard the criticism and introduced a new...

Read More

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims...

Read More

Azure Automation using PowerShell Runbooks

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Read More

Cybersecurity Threats Resource Center

Cybersecurity threats are constantly evolving and knowing how to protect and the latest threat facing your organization is an ongoing battle. Your security department should stay on top of any...

Read More

Threat Update 41 – Viewer Questions

At the end of each Threat Update episode, we invite the audience to ask questions or leave comments, so we took the opportunity to respond to a few. Join Kilian...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.