December 1, 2025
Understanding Business Email Compromise (BEC): Threat Types and Defense Strategies-
Data SecurityMar 29, 2020
Announcing Varonis Edge – to the Perimeter and Beyond
Email, web, and brute force attacks are the primary ways that malware gets through your defenses. The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails. Remote Access Trojans?...
Michael Buckbee
1 min read
-
Data SecurityMar 29, 2020
How Varonis Levels Up Your Incident Response
Varonis arms your incident response team with expert playbooks on how to respond to common alerts, as well as a free IR service to help you when you need it most.
Michael Buckbee
3 min read
-
Data SecurityMar 29, 2020
Kerberos Attack: Silver Ticket Edition
With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty...
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
12 TED Talks That Will Change the Way You Look at Business Cybersecurity
The world of business cybersecurity is always changing. Stay on top of trends and ahead of threats with our 12 favorite cybersecurity TED talks.
Rob Sobers
1 min read
-
Data SecurityMar 29, 2020
8 Events That Changed Cybersecurity Forever
Milestone incidents are what made cybersecurity what it is today - these are the top 8 events that changed cybersecurity, and why they (still) matter.
Michael Buckbee
1 min read
-
Data SecurityMar 29, 2020
Ponemon and NetDiligence Remind Us Data Breach Costs Can Be Huuuge!
Those of us in the infosec community eagerly await the publication of Ponemon’s annual breach cost analysis in the early summer months. What would summer be without scrolling through the...
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
Artificial Intelligence vs. Machine Learning in Cybersecurity
This guide compares artificial intelligence (AI), machine learning (ML) and deep learning (DL) and their roles in current and future cybersecurity practices
Rob Sobers
8 min read
-
Privacy & ComplianceMar 29, 2020
What is FISMA Compliance? Regulations and Requirements
FISMA is the federal government’s security requirements. If you work for on with a federal agency read on to learn how to get (and stay) compliant.
Michael Buckbee
3 min read
-
Data SecurityMar 29, 2020
Kerberos Authentication Explained
Learn more about Kerberos Authentication, the widely-used authorization technology. Contact us today to learn how Varonis monitors Kerberos, and more.
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
9 Infamous APT Groups: Fast Fact Trading Cards
APT groups consist of capable and elusive members who wreak havoc on their targets — learn about infamous APT groups and their MOs through “trading cards”
Rob Sobers
4 min read
-
Data SecurityMar 29, 2020
The Difference Between E3 and E5 Office365 Features
Microsoft’s Enterprise Mobility and Security offerings are additional sets of security services that can be purchased to help control, audit and protect the data and users of Microsoft’s Azure and...
Michael Buckbee
3 min read
-
PowerShellMar 29, 2020
PowerShell Array Guide: How to Use and Create
Learn how to best use PowerShell arrays — we'll cover the basics of how to create them, work with them as well as some more advanced techniques.
Michael Buckbee
10 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital