December 1, 2025
Understanding Business Email Compromise (BEC): Threat Types and Defense Strategies-
Data SecurityFeb 26, 2025
Varonis Opens Data Centers in India to Support Expanding Customer Base and Minimize Cloud Data Risk
Varonis' newest international data centers in India help customers comply with local regulatory frameworks and data privacy sovereignty rules.
Megan Garza
1 min read
-
Cloud SecurityFeb 26, 2025
Understanding Cloud Governance: A Comprehensive Guide
In the rapidly evolving digital landscape, cloud governance has emerged as a crucial framework for organizations using cloud technologies.
Daniel Miller
3 min read
-
Cloud SecurityFeb 24, 2025
What is Cloud Security?
The risks associated with cloud environments are only growing. This blog highlights the basics of cloud security to secure data in the cloud.
Daniel Miller
4 min read
-
Threat ResearchFeb 13, 2025
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and Third-Party Logins
Discover how Astaroth phishing kits bypass security, offer bulletproof hosting, and how Varonis protects businesses from advanced cyber threats.
Daniel Kelley
2 min read
-
AI Security SalesforceFeb 11, 2025
3 Steps to Get Ready for Agentforce
Discover the risks of enabling Agentforce without proper data security and learn specific tactics to ensure a safe deployment.
Eugene Feldman
4 min read
-
AI Security Data SecurityJan 31, 2025
DeepSeek Discovery: How to Find and Stop Shadow AI
Understand the security implications of employees using DeepSeek, such as shadow AI, and how your organization can immediately mitigate risks.
Rob Sobers
2 min read
-
Varonis ProductsJan 30, 2025
What’s New in Varonis: January 2025
Discover Varonis' latest features, including recommendations for right-sizing access in AWS, new M365 remediation policies, and enhanced search management.
Nathan Coppinger
2 min read
-
Threat ResearchJan 29, 2025
Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Discover how the Devil-Traff bulk SMS platform fuels phishing attacks with spoofing and automation.
Daniel Kelley
2 min read
-
Cloud Security RansomwareJan 28, 2025
Ransomware Targets AWS S3 Buckets: How to Prevent Encryption Without Recovery
A new ransomware threat is targeting users of AWS S3 Buckets, which could be a lose-lose scenario for unprotected organizations.
Daniel Miller
2 min read
-
Data Security Healthcare Privacy & ComplianceJan 27, 2025
Decoding Proposed Changes to the HIPAA Security Rule
Learn about recommended changes to the HIPAA Security Rule in the latest Notice of Proposed Rulemaking (NPRM) and discover how health organizations will be impacted.
Shawn Hays
5 min read
-
Data SecurityJan 22, 2025
Shifting the Paradigm: Why Data Security is Finally Taking Center Stage
Craig Mueller, VP of Federal at Varonis, compares how cybersecurity trends have evolved over time and why data should remain at the top of the list.
Craig Mueller
3 min read
-
Data SecurityJan 22, 2025
Speed Data: Navigating Insurance Technology With Ralph Severini
The AWS leader discusses generative AI's future and his role in stopping the first cybercriminal.
Megan Garza
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital