-
Active DirectoryJun 15, 2022
Group Policy Objects (GPOs): How They Work & Configuration Steps
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
David Harrington
6 min read
-
Data SecurityJun 15, 2022
Data Protection Guide: How To Secure Google Drive for Your Business
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
David Harrington
7 min read
-
Privacy & ComplianceJun 07, 2022
What Is Data Governance? Framework and Best Practices
Data Governance helps organize, secure, and standardize data for all types of organizations. Learn more about data governance frameworks here.
David Harrington
9 min read
-
Privacy & ComplianceJun 03, 2022
ISO 27001 Compliance Guide: Essential Tips and Insights
Looking to earn ISO 27001 compliance? Learn about this widely known information security standard, what’s in it, and how to become certified.
Robert Grimmick
9 min read
-
Federal Privacy & ComplianceJun 03, 2022
NIST 800-53: Definition and Tips for Compliance
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
Josue Ledesma
4 min read
-
Privacy & ComplianceJun 02, 2022
NIST 800-171 Compliance Checklist and Terminology Reference
Government contractors who handle Controlled Unclassified Information (CUI) must be NIST 800-171 compliant. Use this checklist as a complete reference.
David Harrington
9 min read
-
Jun 02, 2022
How to Prepare for a Salesforce Permissions Audit
In this post, I'll walk you through what a Salesforce audit is, how permissions work, and provide tips on how you can prepare.
Mike Mason
5 min read
-
Data SecurityMay 20, 2022
Data Breach Statistics & Trends [updated 2025]
These data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.
Rob Sobers
12 min read
-
RansomwareMay 16, 2022
Why Every Cybersecurity Leader Should ‘Assume Breach’
Any system, account or person at any time can be a potential attack vector. With such a vast attack surface, you need to assume attackers will breach at least one vector.
Yaki Faitelson
3 min read
-
Threat ResearchMay 11, 2022
Spoofing SaaS Vanity URLs for Social Engineering Attacks
SaaS vanity URLs can be spoofed and used for phishing campaigns and other attacks. In this article, we’ll showcase two Box link types, two Zoom link types, and two Google Docs link type that we were able to spoof.
Tal Peleg
6 min read
-
RansomwareMay 06, 2022
Bad Rabbit Ransomware
Bad Rabbit is a ransomware strain that spread via hacked websites, infected systems via a fake Adobe installer and held encrypted files for Bitcoin.
Michael Raymond
3 min read
-
Threat ResearchApr 19, 2022
Hive Ransomware Analysis
Learn how Hive ransomware exploits public servers, spreads through your network, encrypts sensitive files, and exports victims for cryptocurrency.
Nadav Ovadia
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital