Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

What is Zero Trust? A Security Model

Zero Trust is a security model developed by former Forrester analyst John Kindervag in 2010. Since then, Zero Trust has become one of the more popular frameworks in cybersecurity. Recent...

Read More

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

Read More

A Year in the Life of the GDPR: Must-Know Stats and Takeaways

The one-year anniversary of the implementation of the General Data Protection Regulation (GDPR) recently passed, a significant milestone in data privacy and user protection. The GDPR is a piece of...

Read More

What is HIPAA Compliance? Your 2019 Guide + Checklist

HIPAA fines cost ten companies $28.7 million in 2018, which broke the previous 2016 record for HIPAA fines by 22%! That’s only 10 HIPAA cases resolved out of 25,912 complaints...

Read More

Solving The Cybersecurity Skills Shortage Within Your Organization

It’s simple economics: supply and demand. A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses....

Read More

Varonis Named a ‘Strong Performer’ in 2019 Forrester Wave for Data Security Portfolio Vendors

Varonis has been singled out by Forrester as one of “the 13 providers who matter most” of data security vendors in their Forrester Wave™: Data Security Portfolio Vendors, Q2 2019....

Read More

Understanding Security Analytics Platforms

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Read More

How Varonis Helps with Email Security

Email is one of the most common points of entry for malware (at over 94%) and phishing emails are on the rise, costing companies an average of $1.6 million. Compromised...

Read More

Which Cybersecurity Career Is Right For Me?

New high-profile cyber attacks seem to constantly flood news headlines, so it’s no wonder that cybersecurity experts are becoming such an important and in-demand position for all types of firms....

Read More

Varonis eBook: Cyber Risk Modeling for CISOs

Our  CISO Guide to Cybersecurity Risk ebook is the perfect read for busy IT executive who’ve yet to discover a shocking secret about CEOs and cybersecurity. What’s that secret you...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.