Blog / Data Security (5)
Data Security (5)

What Is a Botnet? Definition and Prevention

Mar 18, 2022
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.

SecurityRWD - Introduction to AWS Simple Storage Service (S3)

Mar 17, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team compare and contrast Amazon Web Services S3 to traditional on-prem storage systems. Listen in as the team discusses how AWS S3 goes beyond basic data storage, and enables programmatic access to apps and services inside and outside the AWS environment.

SecurityRWD - Introduction to AWS Identity and Access Management (IAM)

Mar 04, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team compare and contrast Amazon Web Services Identity and Access Management against a traditional on-prem setup with Active Directory. Listen in as the team discusses how AWS IAM goes beyond simple user and group management to creating an entire network and defining access to network resources and infrastructure.

SecurityRWD - Introduction to AWS Services

Mar 01, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team kick off a new series diving into the various services found under the AWS umbrella. In this video, they introduce and provide an overview of some of the core services including IAM, S3, and EC2.

Common Types of Malware

Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.

SecurityRWD - Abusing Power Automate to Exfiltrate Data from Microsoft 365

Feb 18, 2022
Kilian Englert and Ryan O'Boyle from Varonis explore how a powerful, built-in tool called Power Automate can be configured to automatically exfiltrate data out of Microsoft 365 environments and what organizations can do to detect it..

SecurityRWD - Microsoft 365 Makes Collaboration Easy – Almost Too Easy

Feb 15, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team examine different types of sharing in Microsoft 365, and what really happens behind the scenes.

Identify and Investigate Business Email Compromise (BEC) Scams

Feb 10, 2022
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

SecurityRWD - What Happens When You Create A Microsoft Team?

Feb 09, 2022
Microsoft Teams seems like a straightforward collaboration platform, but the deceptive simplicity hides the true complexity lurking just under the surface.

SecurityRWD – Understanding Salesforce Entitlements

Feb 01, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 73 - What is a Cloud Access Security Broker (CASB)?

Jan 14, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 72 - What is SaaS Security Posture Management (SSPM)?

Jan 11, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
No overhead. Just outcomes.