Blog

Cloud Security

Understanding and Applying the Shared Responsibility Model at Your Organization

Tristan Grush

Tristan Grush

To avoid significant security gaps and risks to sensitive data, organizations need to understand the shared responsibility model used by many SaaS providers.

CSPM and DSPM overview

DSPM vs. CSPM Solutions: Bridging Data and Cloud Security With Varonis

Nathan Coppinger

Nathan Coppinger

Explore the essential roles of DSPM and CSPM solutions, and see how Varonis uniquely enables you to bridge the gap between cloud and data security. 

cloud being protected

How to Protect Your Cloud Environment From Today’s Top 5 Threats

Lexi Croisdale

Lexi Croisdale

Learn the top five cloud threats after your sensitive data and how to protect your organization from them.

Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe

Yaki Faitelson

Yaki Faitelson

This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.

drive in the cloud being hacked, illustration

Building a Cloud Security Program From the Ground Up

Megan Garza

Megan Garza

There’s no one-size-fits-all approach to cloud security, but Varonis has laid out a blueprint to help guide you through the steps and start off strong.

What Automation Means For Cybersecurity—And Your Business

Yaki Faitelson

Yaki Faitelson

This article explains how automation can help turn the right information into action, helping to defend against cyberattacks, mitigate risk, shore up compliance and improve productivity.

How Varonis' approach to SSPM helps your company

How Varonis' Approach to SSPM Helps Your Company

Nathan Coppinger

Nathan Coppinger

Adopt a data-first approach with Varonis' SSPM, securing SaaS apps and reducing risk. Learn how you can get better visibility, automation, and protection.

What is IDOR (Insecure Direct Object Reference)?

Robert Grimmick

Robert Grimmick

Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.

SaaS Risk Report Reveals Exposed Cloud Data is a $28M Risk for Typical Company

Rachel Hunt

Rachel Hunt

The Great SaaS Data Exposure examines the challenge CISOs face in protecting data across a growing portfolio of SaaS apps and services such as Microsoft 365.

Change These 7 Security Settings After Creating a New AWS Account

Shane Waterford

Shane Waterford

Use these seven AWS security best practices for simple configuration changes on a new AWS account.

How to Create S3 Buckets in AWS with CloudFormation: Step-by-Step Guide

Shane Waterford

Shane Waterford

Use AWS CloudFormation to create resources such as S3 buckets. Infrastructure as code enables a repeatable, reliable deployment process. Learn more here.

Introduction to AWS DevOps: Skills + Tools You Need

Meenakshi Kasi

Meenakshi Kasi

Amazon Web Services has capabilities that help you accelerate Devops journey. In this article, we discuss the AWS tools, architecture and how they help organizations increase the ability to deliver and deploy applications at high velocity and better quality.

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.