Blog

Cloud Security

Cloud image with warning symbols and alerts in Copilot, a LLM and AI related tool

Breaks in the Cloud: Protecting Against Top LLM Risks

Megan Garza

Megan Garza

Understand the risk of Large Language Models (LLMs) to your cloud security and why it's important to be cautious when adopting new technologies.

AWS Misconfigurations Lead to Data Exposure

AWS Misconfigurations Lead to Exposed Data

Varonis Threat Labs

Varonis Threat Labs

Discover how a recent data extortion campaign exposed sensitive files in thousands of AWS environments and what you can do to prevent it from happening to you.

Without automation, cloud data security doesn't stand a chance.

Cloud Security Essentials: The Case for Automated DSPM

Nolan Necoechea

Nolan Necoechea

Data security posture management (DSPM) has emerged as a standard for securing sensitive data in the cloud and other environments. However, without automation, DSPM doesn’t stand a chance. Automation is crucial to overcoming the challenges of securing data in the cloud.

Understanding and Applying the Shared Responsibility Model at Your Organization

Tristan Grush

Tristan Grush

To avoid significant security gaps and risks to sensitive data, organizations need to understand the shared responsibility model used by many SaaS providers.

CSPM and DSPM overview

DSPM vs. CSPM Solutions: Bridging Data and Cloud Security With Varonis

Nathan Coppinger

Nathan Coppinger

Explore the essential roles of DSPM and CSPM solutions, and see how Varonis uniquely enables you to bridge the gap between cloud and data security. 

cloud being protected

How to Protect Your Cloud Environment From Today’s Top 5 Threats

Lexi Croisdale

Lexi Croisdale

Learn the top five cloud threats after your sensitive data and how to protect your organization from them.

Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe

Yaki Faitelson

Yaki Faitelson

This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.

drive in the cloud being hacked, illustration

Building a Cloud Security Program From the Ground Up

Megan Garza

Megan Garza

There’s no one-size-fits-all approach to cloud security, but Varonis has laid out a blueprint to help guide you through the steps and start off strong.

What Automation Means For Cybersecurity—And Your Business

Yaki Faitelson

Yaki Faitelson

This article explains how automation can help turn the right information into action, helping to defend against cyberattacks, mitigate risk, shore up compliance and improve productivity.

How Varonis' approach to SSPM helps your company

How Varonis' Approach to SSPM Helps Your Company

Nathan Coppinger

Nathan Coppinger

Adopt a data-first approach with Varonis' SSPM, securing SaaS apps and reducing risk. Learn how you can get better visibility, automation, and protection.

What is IDOR (Insecure Direct Object Reference)?

Robert Grimmick

Robert Grimmick

Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.

SaaS Risk Report Reveals Exposed Cloud Data is a $28M Risk for Typical Company

Rachel Hunt

Rachel Hunt

The Great SaaS Data Exposure examines the challenge CISOs face in protecting data across a growing portfolio of SaaS apps and services such as Microsoft 365.

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.