December 1, 2025
Understanding Business Email Compromise (BEC): Threat Types and Defense Strategies-
Cloud Security Data SecurityJan 21, 2025
Varonis Once Again Named a Leader in GigaOm Radar for Data Security Platforms
GigaOm, a leading analyst firm, recognizes Varonis for behavioral analytics, access security, service integration, & continued innovation in AI & automation.
Nolan Necoechea
2 min read
-
Cloud SecurityJan 15, 2025
Change These 7 Security Settings After Creating a New AWS Account
Take these immediate actions to enhance your security posture significantly when creating a new AWS account.
Lexi Croisdale
8 min read
-
AI Security Email SecurityJan 13, 2025
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Learn how a lightning-fast phishing attack mimicking Black Basta tactics was quickly stopped by Varonis Interceptor.
Stephen Kowski
4 min read
-
Data SecurityJan 09, 2025
Speed Data: Iron-Clad Security With Aaron Ansari
Aaron Ansari, virtual CISO of Exela Pharma Sciences, shares his insights on proactive planning, organizational control, and what it takes to be an Ironman.
Megan Garza
2 min read
-
Threat ResearchJan 06, 2025
Meet PhishWP — The New WordPress Plugin That’s Turning Legit Sites into Phishing Traps
Discover how PhishWP, a malicious WordPress plugin, turns trusted sites into phishing traps and how to protect yourself with Varonis.
Daniel Kelley
3 min read
-
Cloud SecurityJan 02, 2025
What is S3 Bucket Namesquatting, and How Do You Prevent It?
This blog examines AWS S3 bucket namesquatting, methods to address the issue, and how Varonis can prevent this and other data security problems in AWS.
Nolan Necoechea
3 min read
-
Data Security Varonis ProductsDec 20, 2024
How Varonis Improves Data Security with Automated Labeling
Discover the power of Varonis' automated labeling and how it can be an important element in securing your sensitive data.
Nolan Necoechea
4 min read
-
Varonis ProductsDec 19, 2024
What’s New in Varonis: December 2024
Discover Varonis' latest features, including support for Databricks and ServiceNow, automated threat responses, and more.
Nathan Coppinger
1 min read
-
Data Security Varonis ProductsDec 18, 2024
What Is Data Masking?
Learn what data masking is, why it matters, and how to automatically protect sensitive data in cloud databases using dynamic, policy-based masking techniques.
Nathan Coppinger
6 min read
-
Data Security IdentityDec 17, 2024
Why Identity is the Biggest Blind Spot in Data Security
Modern Data Security Platforms (DSP) must integrate identity risk and context for effective posture management, threat detection, and response.
Shawn Hays
3 min read
-
Cloud SecurityDec 16, 2024
Implementing AWS Resource Control Policies: Key Features and Benefits
AWS' new Resource Control Policies (RCPs) aim to improve control over resource access. However, organizations should approach implementation with caution.
Dubie Dubendorfer
2 min read
-
Cloud Security Data SecurityDec 16, 2024
AWS vs Azure vs Google: Cloud Services Comparison
This AWS vs Azure vs Google comparison evaluates these public cloud providers including pricing, computing, storage and other features.
Dubie Dubendorfer
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital