-
Varonis Products
Sep 05, 2024
Protecting Salesforce: Remediating Misconfigured Sites
Organizations worldwide use Salesforce Sites to provide information and services to partners and customers. However, when configuring these sites, something as simple as a missed checkbox can expose sensitive and regulated data to unauthenticated, anonymous guest users — effectively exposing the information publicly.
Nathan Coppinger
1 min read
-
Privacy & Compliance
Aug 29, 2024
What The New SEC Cyber Disclosure Guidelines Mean For Your Business
The SEC cybersecurity disclosure rules that went into effect in December 2023 were clarified in June 2024. The guidelines require public companies to report “material” breaches within four business days of the materiality determination and document their processes “for assessing, identifying, and managing material risks from cybersecurity threats” in annual filings.
Yaki Faitelson
3 min read
-
Varonis Products
Aug 28, 2024
What’s New in Varonis: August 2024
Varonis’ latest updates help customers automatically discover unique data, manage effective permissions, and respond to threats faster.
Shane Walsh
2 min read
-
Cloud Security
Aug 22, 2024
AWS Misconfigurations Lead to Exposed Data
Early this week it was discovered that AWS environments had been compromised through exposed .env files. Unit 42 researchers discovered a data extortion campaign that exposed files containing AWS access keys, credentials for databases and social media accounts, API keys for SaaS applications and email services, as well as access tokens for a variety of cloud services. Around 110,000 domains were affected, leading to the potential exposure of over 90,000 unique environment variables with 7,000 corresponding to cloud services used by organizations. What does this mean? If you rely on AWS, now's a great time to ensure your configurations are secure, permissions are right-sized, and you’re monitoring for abnormal activity.
Varonis Threat Labs
3 min read
-
Data Security Speed Data
Aug 21, 2024
Speed Data: Pentesting and Proactive Threat Hunting With Tim Callahan
Welcome to Speed Data: Quick Conversations With Cybersecurity Leaders. Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight in a rapid format for security professionals pressed for time.
Megan Garza
2 min read
-
AI Security Privacy & Compliance
Aug 16, 2024
The EU AI Act: What it is and Why it’s Important
Earlier this year, the European Parliament and Council agreed to regulate the use of AI in the EU with the passage of the European Union Artificial Intelligence Act (EU AI Act), the world’s first comprehensive AI regulation.
Nolan Necoechea
3 min read
-
Varonis Products
Aug 07, 2024
Varonis Announces Integrations With SentinelOne and Microsoft Defender for Endpoint
Varonis now integrates with leading EDR providers Microsoft Defender for Endpoint and SentinelOne, expanding our Managed Data Detection and Response (MDDR) visibility to customers’ endpoints.
Shane Walsh
1 min read
-
Data Security
Aug 06, 2024
Varonis Announces AI-Powered Data Discovery and Classification
Today, we are strengthening our industry-leading data classification engine with powerful new AI data classification capabilities.
Rob Sobers
3 min read
-
Varonis Products
Jul 25, 2024
What's New in Varonis: July 2024
This month, we released new updates in Varonis that help you find and protect sensitive data wherever it lives.
Nathan Coppinger
2 min read
-
AI Security Data Security Speed Data
Jul 22, 2024
Speed Data: AWS, Gen AI, and SecDataOps With Jonathan Rau
Welcome to Speed Data: Quick Conversations With Cybersecurity Leaders. Like speed dating, our goal is to capture the hearts of CISOs with intriguing, unique insight in a rapid format for security professionals pressed for time.
Megan Garza
3 min read
-
Data Security
Jul 19, 2024
CrowdStrike Blue Screen Recovery Steps
This post contains updates and recovery steps for the Windows blue screen of death (BSOD) issue currently affecting devices and VMs running CrowdStrike Falcon Sensor.
Varonis Threat Labs
3 min read
-
Threat Research
Jul 18, 2024
The Power and Peril of RMM Tools
The conventional office setting has changed in recent years as more people work from home and living room workstations, creating a new hybrid work model. IT departments must now deal with various devices distributed over different cities and countries, relying on VPNs and remote monitoring and management (RMM) tools for system administration.
Tom Barnea
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital