December 1, 2025
Understanding Business Email Compromise (BEC): Threat Types and Defense Strategies-
Data SecurityMar 29, 2020
Protect Your Data With Super Easy File Security Tricks!
But if you drill down a little in your thinking, it’s easy to see that data security is ultimately protecting a file somewhere on your system—whether desktops or servers. While data security is a good umbrella term, we need to get into more details to understand file security.
Michael Buckbee
6 min read
-
Data SecurityMar 29, 2020
Social Media Security: How Safe is Your Information?
What exactly are social media platforms doing to keep your information safe? We’ve broken down the security initiatives and features to find out!
Rob Sobers
2 min read
-
Active DirectoryMar 29, 2020
How to Run an Active Directory Audit Using Varonis
AD is a primary target for attackers. Read on to learn how to use Varonis to discover vulnerabilities and remediate risk in an Active Directory audit.
Michael Buckbee
6 min read
-
Data SecurityMar 29, 2020
What is an Advanced Persistent Threat (APT)?
An advanced persistent threat is a long term operation designed to steal as much valuable data as possible. Learn how to protect your organization and more
Michael Buckbee
4 min read
-
Privacy & ComplianceMar 29, 2020
NYS SHIELD Act: Updates to PII, Data Security, and Breach Notification
After the devastating Equifax incident, the New York State legislature introduced the Stop Hacks and Improve Electronic Data Security or SHIELD Act in order to update the existing breach rules....
Michael Buckbee
5 min read
-
Data SecurityMar 29, 2020
10 Secure File Sharing Options, Tips and Solutions
When moving digital data across networks, there is a number of different tools and solutions that will fit various business needs at the enterprise level.
Michael Buckbee
8 min read
-
Data SecurityMar 29, 2020
5 Cybersecurity Concerns of Industry Insiders
We asked professionals attending two of the world’s biggest cybersecurity conferences – RSA in San Francisco and Infosecurity in London – five questions to gauge their opinions and attitudes about current cybersecurity concerns and issues. Read on to discover what we found!
Rachel Hunt
3 min read
-
Data SecurityMar 29, 2020
Zero-Day Vulnerability Explained
Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.
Michael Buckbee
3 min read
-
Data SecurityMar 29, 2020
Exchange Vulnerability: How to Detect Domain Admin Privilege Escalation
Researchers recently uncovered a vulnerability in Exchange that allows any domain user to obtain Domain admin privileges that allow them to compromise AD and connected hosts. Here’s how the attack...
Michael Buckbee
1 min read
-
Privacy & ComplianceMar 29, 2020
What the H**L Does Reasonable Data Security Really Mean?
For anyone who’s spent time looking at data security laws and regulations, you can’t help but come across the words “reasonable security”, or its close cousin “appropriate security”. You can...
Michael Buckbee
3 min read
-
Privacy & ComplianceMar 29, 2020
Post-Davos Thoughts on the EU NIS Directive
I’ve been meaning to read the 80-page report published by the World Economic Forum (WEF) on the global risks humankind now faces. They’re the same folks who bring you the once...
Michael Buckbee
3 min read
-
Data SecurityMar 29, 2020
Working in Cybersecurity: A Day in the Life
Explore what working in cybersecurity is like through expert Q&As, career paths, required skills, and tips for breaking into this growing field.
Rob Sobers
19 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital