Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Browsing Anonymously: Is It Really Anonymous?

Privacy is top of mind for many people these days. Unclear privacy policies, rampant data collection and high-profile data breaches can lead us to second guess our information’s safety —...

Read More

Varonis Community Announces ‘Varonis Elite’ Program

In February, Varonis launched the ‘Varonis Elite’ program. An initiative that brings cybersecurity and Varonis enthusiasts together, to learn more from one another and engage with Varonis in new ways...

Read More

[Online Conference] Varonis Coffee Series: Unique Insights Into Data Security and Privacy

Looking for a different take on the data security landscape? Join our multi-disciplinary team of experts as they discuss the laws, ethics, and defensive techniques behind data protection and privacy. Over four Tuesdays starting...

Read More

Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims

The Varonis Security Research team discovered a global cyber attack campaign leveraging a new strain of the Qbot banking malware. The campaign is actively targeting U.S. corporations but has hit networks...

Read More

Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation

Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...

Read More

Spotlighting Unstructured Data Access

At Varonis, we sometimes highlight external articles, especially when they provide independent insight into our solution. Dr. Edward G. Amoroso, former Senior Vice President and Chief Security Officer of AT&T,...

Read More

Group Policy Editor Guide: How to Configure and Use

The Group Policy Editor is a Windows administration tool that allows users to configure many important settings on their computers or networks. Administrators can configure password requirements, startup programs, and...

Read More

Windows Defender Turned Off by Group Policy [Solved]

Picture this scenario: You log into your computer on any random Thursday, and Windows Defender won’t start. You manually kick it off, and you get the message “Windows Defender is...

Read More

Protect Your Data With Super Easy File Security Tricks!

Data security is an all-encompassing term. It covers processes and technologies for protecting files, databases, applications, user accounts, servers, network logins, and the network itself. But if you drill down...

Read More

Americans and Privacy Concerns: Who Do We Trust?

Who do Americans trust with their information? In light of massive data breaches, Americans have doubts about the safety of their personal data. Events like the Facebook Cambridge Analytica hack...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.