Data Security
SecurityRWD - Introduction to AWS Services
Mar 01, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team kick off a new series diving into the various services found under the AWS umbrella. In this video, they introduce and provide an overview of some of the core services including IAM, S3, and EC2.
Common Types of Malware
Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.
SecurityRWD - Abusing Power Automate to Exfiltrate Data from Microsoft 365
Feb 18, 2022
Kilian Englert and Ryan O'Boyle from Varonis explore how a powerful, built-in tool called Power Automate can be configured to automatically exfiltrate data out of Microsoft 365 environments and what organizations can do to detect it..
SecurityRWD - Microsoft 365 Makes Collaboration Easy – Almost Too Easy
Feb 15, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team examine different types of sharing in Microsoft 365, and what really happens behind the scenes.
Identify and Investigate Business Email Compromise (BEC) Scams
Feb 10, 2022
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.
SecurityRWD - What Happens When You Create A Microsoft Team?
Feb 09, 2022
Microsoft Teams seems like a straightforward collaboration platform, but the deceptive simplicity hides the true complexity lurking just under the surface.
SecurityRWD – Understanding Salesforce Entitlements
Feb 01, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
Threat Update 73 - What is a Cloud Access Security Broker (CASB)?
Jan 14, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
Threat Update 72 - What is SaaS Security Posture Management (SSPM)?
Jan 11, 2022
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
Threat Update 69 - What is Secure Access Service Edge (SASE)?
Dec 15, 2021
Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.
What is an APT?: Advanced Persistent Threat Overview
Dec 08, 2021
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
What is a Brute Force Attack? Definition
Dec 08, 2021
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.
Try Varonis free.
Deploys in minutes.