Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests

Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...

Read More

How Varonis Helps Stop Emotet

Our incident response team is tracking an unprecedented number of Emotet malware infections. The number of active concurrent Emotet investigations is threefold our previous high-water mark. This post will cover...

Read More

Exploiting BGInfo to Infiltrate a Corporate Network

Executive Summary There is a remote code execution attack vector within BGInfo. A clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi). If...

Read More

Government Hacking Exploits, Examples and Prevention Tips

Government hacking exploits, unfortunately, pose a very real threat for organizations of all kinds, and those of us working in cybersecurity need to be aware of it. A decade ago,...

Read More

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) is a security paradigm whereby users are granted access to resources based on their role in the company. RBAC, if implemented correctly, can be an effective...

Read More

What is Azure Active Directory? A Complete Overview

Azure Active Directory (Azure AD) is Microsoft’s enterprise cloud-based identity and access management (IAM) solution. Azure AD is the backbone of the Office 365 system, and it can sync with...

Read More

Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software

Varonis received the Gartner Peer Insights Customers’ Choice distinction for the File Analysis Software market. We’re particularly proud of this recognition because it is 100% based on customer feedback. Thank...

Read More

What is a Man-in-the-Middle Attack: Detection and Prevention Tips

A man-in-the-middle (MitM) attack is a form of cyberattack where important data is intercepted by an attacker using a technique to interject themselves into the communication process. The attacker can...

Read More

Risk Management Framework (RMF): An Overview

The Risk Management Framework (RMF) is a set of criteria that dictate how the United States government IT systems must be architected, secured, and monitored.  Originally developed by the Department...

Read More

Active Directory Account Lockout: Tools and Diagnosis Guide

Account lockouts are a headache for system administrators, and they happen a lot in Active Directory (AD). Research shows that account lockouts are the biggest single source of calls to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.