Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

AWS vs Azure vs Google: Cloud Services Comparison

Doing business in a cloud is more than just a lovely way to pass the time. Cloud computing services make sense from both a strategic and performance angle. However, business...

Read More

How Varonis Levels Up Your Incident Response

It’s a good time to be in cybersecurity. Incident Response(IR) teams are growing like crazy, and there are more jobs in cybersecurity than qualified candidates. The challenge for organizations is...

Read More

Insights into User Entity Behavior Analytics (UEBA)

User Behavior Analytics or UBA was and still is the term for describing searching for patterns of usage that indicate unusual computing activities — regardless of whether it’s coming from...

Read More

Permission Propagation: Info and Tips

Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all...

Read More

We Know About Your Company’s Data: OSINT Lessons for C-Levels

 I’ve been on a mission the last few months to bring  basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Read More

How to Investigate NTLM Brute Force Attacks

In this blog, we will describe the workflow the Varonis IR Team uses to investigate NTLM brute force attacks, which are a common type of attack they see in the...

Read More

The California Privacy Act (CCPA) Clones Are Coming: States Draft Copycat Laws

In 2018, the California Consumer Privacy Act (CCPA) was signed into law. Its goal is to extend consumer privacy protections to the internet. The CCPA was heavily influenced by the...

Read More

PowerShell for Pentesters: Scripts, Examples and Tips

In case you haven’t noticed, we’ve been championing PowerShell as a pentesting tool in more than a few blog posts. One big reason to learn PowerShell and use it to...

Read More

2019 Data Risk Report Stats and Tips You Won’t Want to Miss

Each year, Varonis conducts thousands of data risk assessments for organizations that want a clearer picture of their security posture and develop a roadmap to reducing risk to sensitive data....

Read More

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

You may have heard that Microsoft changed their guidance on password expiration policies. On May 23, 2019, they released a blog post explaining their decisions. As cybersecurity experts already know,...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.