-
Cloud Security
Oct 14, 2022
What is IDOR (Insecure Direct Object Reference)?
Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.
Robert Grimmick
6 min read
-
Active Directory
Oct 05, 2022
Azure Managed Identities: Definition, Types, Benefits + Demonstration
Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.
Neeraj Kumar
7 min read
-
Privacy & Compliance
Oct 03, 2022
The 12 PCI DSS Requirements: 4.0 Compliance Checklist
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) is right around the corner. Prepare with our PCI DSS compliance checklist.
David Harrington
8 min read
-
Varonis Products
Sep 27, 2022
Varonis Adds Secrets Discovery for On-Prem and Cloud Data Stores
Varonis can help you scan your environments for rogue secrets exposed in files and code stored on-prem and in the cloud.
Rob Sobers
5 min read
-
Threat Research
Sep 15, 2022
Fighting Golden Ticket Attacks with Privileged Attribute Certificate (PAC)
Learn how and why to control the Active Directory Environment state with PACRequestorEnforcement, the implications of doing so and how to detect Golden Ticket attacks happening in your network.
Masha Garmiza
4 min read
-
Varonis Products
Sep 13, 2022
Compare Salesforce user permissions with ease
DatAdvantage Cloud now enables admins to compare two Salesforce users’ effective permissions side-by-side with a simple click of a button.
Nathan Coppinger
2 min read
-
Data Security
Sep 09, 2022
What Is a Data Leak? Definition and Prevention Tips
Learn why data leaks can be devastating for companies and how you can defend against them.
Nolan Necoechea
4 min read
-
Data Security
Sep 09, 2022
What Is Zero Trust? Architecture and Security Guide
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.
Michael Buckbee
8 min read
-
Privacy & Compliance
Sep 02, 2022
U.S. Privacy Laws: The Complete Guide
This guide breaks down the entirety of the U.S. privacy law ecosystem to help you understand the rights and obligations of citizens and businesses.
David Harrington
9 min read
-
Privacy & Compliance
Aug 26, 2022
SOC 2 Compliance Definition & Checklist
System and Organization Controls (SOC 2) compliance requires adherence to specific guidelines. This detailed definition and checklist can get you started.
David Harrington
6 min read
-
Data Security
Aug 26, 2022
What is Mimikatz? The Beginner's Guide
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.
Michael Buckbee
4 min read
-
Threat Research
Aug 22, 2022
Anatomy of a SolidBit Ransomware Attack
Solidbit is a ransomware variant derived from Yashma and containing elements of LockBit. Discover how Solidbit's capabilities, execution, what file types it targets, and how to tell if you're been infected.
Jason Hill
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital