Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Blog / Data Security (2)

Data Security (2)

What Is Zero Trust? Architecture and Security Guide

Michael Buckbee

Michael Buckbee

Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.

What is Mimikatz? The Beginner's Guide

Michael Buckbee

Michael Buckbee

Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.

How to Use Wireshark: Comprehensive Tutorial + Tips

Kody Kinzie

Kody Kinzie

Learn how to use Wireshark, a widely-used network packet and analysis tool. This tutorial has everything from downloading to filters to packets.

SecurityRWD - How Amazon S3 Object-Tagging Can Put Form Around Flat Storage

Kilian Englert

Kilian Englert

Your favorite Varonis team members Ryan O'Boyle and Kilian Englert will explain how unlike classic storage arrays or traditional file servers, S3 buckets are a linear, flat storage solution, offering data object-tagging to create a sense of hierarchy.

What Is SQL Injection? Identification & Prevention Tips

Alvin Mwambi

Alvin Mwambi

SQL injection is a serious open web application security project (OWASP) vulnerability. Learn more about how to combat injection attacks in this article.

166 Cybersecurity Statistics and Trends [updated 2022]

Rob Sobers

Rob Sobers

These cybersecurity statistics for 2021 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, job outlook.

Data Lifecycle Management (DLM): Everything You Need to Know

David Harrington

David Harrington

Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.

What is the CIA Triad?

Josue Ledesma

Josue Ledesma

Learn how the CIA triad can be used to classify, secure, and protect your data.

What Is Network Access Control? Explaining NAC Solutions

Robert Grimmick

Robert Grimmick

Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.

86 Ransomware Statistics, Data, Trends, and Facts [updated 2022]

Rob Sobers

Rob Sobers

Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.

What is SSPM? Overview + Guide to SaaS Security Posture Management

David Harrington

David Harrington

SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.

IDS vs. IPS: What Organizations Need to Know

Josue Ledesma

Josue Ledesma

We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.

We're Varonis.
Our mission is to deliver meaningful security outcomes on autopilot.
No overhead. Just outcomes.