Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

Data Security

What is a Security Policy? Definition, Elements, and Examples

Robert Grimmick

Robert Grimmick

A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.

What is Open XDR? Benefits and Security Comparisons

Josue Ledesma

Josue Ledesma

Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

What is Traceroute? How It Works and How to Read Results

Robert Grimmick

Robert Grimmick

Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Robert Grimmick

Robert Grimmick

Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

Evil Twin Attack: What it is, How to Detect & Prevent it

Josue Ledesma

Josue Ledesma

The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.

How to Paint the Complete Picture of Salesforce Objects and Fields

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team explain why — when it comes to understanding what Salesforce objects and fields a user can access — all levels of entitlements need to be taken into consideration to gain a holistic view of what the user can do (or cannot) do in Salesforce.

What is Cyber Espionage? Complete Guide with Protection Tips

Robert Grimmick

Robert Grimmick

Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.

Data Protection Guide: How To Secure Google Drive for Your Business

David Harrington

David Harrington

Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.

So I Creep: Aggregating Salesforce Permissions Can Add up to Excessive Risk

Kilian Englert

Kilian Englert

Salesforce entitlements go beyond object and record access — they can give users the ability to perform actions within Salesforce as well. Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team discuss how the combination of Salesforce profiles, permission sets, and permission set groups can grant users far greater rights than were intended.

Spoofing, and SaaS Vanity URLs, and Social Engineering... Oh My!

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle discuss the recent discovery by Varonis researchers of risks in vanity URL validation, and share what to do to prepare your organization for if (or more likely when) a user accidentally discloses credentials.

84 Must-Know Data Breach Statistics [2023]

Rob Sobers

Rob Sobers

These 2022 data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.

SecurityRWD – Getting Started With Salesforce Entitlements

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from Varonis dive into the Salesforce interface, cover the basics of navigation, and share what to look for when performing a manual Salesforce entitlement review.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.