Blog / Data Security
Data Security

How a Doggo Can Teach You the Difference Between Salesforce Objects and Records

Jun 30, 2022
What can Fido teach you about Salesforce? Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team host a special, goodest boy guest to explain the difference between objects, fields, and records in the popular CRM.

DNS over HTTPS as a covert Command and Control channel

Jun 30, 2022
Learn how DNS over HTTPS (DoH) is being actively used as a Command and Control (C2) channel by threat actors.

What is Red Teaming? Methodology & Tools

Jun 29, 2022
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.

What is a Security Policy? Definition, Elements, and Examples

Jun 29, 2022
A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.

What is Open XDR? Benefits and Security Comparisons

Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

What is Traceroute? How It Works and How to Read Results

Jun 25, 2022
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Jun 24, 2022
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

Evil Twin Attack: What it is, How to Detect & Prevent it

Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.

How to Paint the Complete Picture of Salesforce Objects and Fields

Jun 22, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team explain why — when it comes to understanding what Salesforce objects and fields a user can access — all levels of entitlements need to be taken into consideration to gain a holistic view of what the user can do (or cannot) do in Salesforce.

What is Cyber Espionage? Complete Guide with Protection Tips

Jun 16, 2022
Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.

Data Protection Guide: How To Secure Google Drive for Your Business

Jun 15, 2022
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.

So I Creep: Aggregating Salesforce Permissions Can Add up to Excessive Risk

Jun 10, 2022
Salesforce entitlements go beyond object and record access — they can give users the ability to perform actions within Salesforce as well. Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team discuss how the combination of Salesforce profiles, permission sets, and permission set groups can grant users far greater rights than were intended.
No overhead. Just outcomes.