Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

Data Security

Microsoft LAPS Overview: Setup, Installation, and Security

David Harrington

David Harrington

Learn the basics of Microsoft LAPS to keep users from gaining unauthorized access to your system. Contact us for help with your data protection needs.

Varonis extends security capabilities to Nutanix Files

Nathan Coppinger

Nathan Coppinger

The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis…

The Ultimate Guide to Procmon: Everything You Need to Know

David Harrington

David Harrington

Knowledge is power when it comes to maintaining a proactive cybersecurity posture. Knowing what’s going on within your systems and monitoring networks for potential issues, hacks, or malware is critical…

Salesforce Security Guide: Best Practices

Renganathan Padmanabhan

Renganathan Padmanabhan

Data breaches exposed 36 billion records in the first half of 2020. This number continues to increase as more businesses go online, with more knowledge workers working remotely in 2021….

Google Workspace Data Protection Guide & Resources

Renganathan Padmanabhan

Renganathan Padmanabhan

Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and…

Texas Privacy Act: Overview and Compliance Guide

David Harrington

David Harrington

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is…

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…

Threat Update 54 – SSO Imposter: Intrusion

Kilian Englert

Kilian Englert

Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…

Threat Update 52 – 2021 SaaS Risk Report

Kilian Englert

Kilian Englert

Cloud solutions have changed the way we do business, allowing organizations to leverage the scale and flexibility of SaaS, and IaaS platforms, and support an increasingly mobile “work from anywhere...

How to Fix Broken Registry Items: Visual Guide and Solutions

Robert Grimmick

Robert Grimmick

Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.

Threat Update 51 – LockBit and Insider Threats for Hire

Kilian Englert

Kilian Englert

Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue. It was only a matter of time before these two...

Last Week in Ransomware: Week of August 16th

Michael Raymond

Michael Raymond

This week was a win with REvil and SynACK decryption keys being released, but also saw a rise in PrintNightmare use by ransomware gangs.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.