Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

Data Security

SecurityRWD - Introduction to AWS Services

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team kick off a new series diving into the various services found under the AWS umbrella. In this video, they introduce and provide an overview of some of the core services including IAM, S3, and EC2.

Common Types of Malware

Neil Fox

Neil Fox

This piece covers the various types of malware that are available and their characteristics.

SecurityRWD - Abusing Power Automate to Exfiltrate Data from Microsoft 365

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from Varonis explore how a powerful, built-in tool called Power Automate can be configured to automatically exfiltrate data out of Microsoft 365 environments and what organizations can do to detect it..

SecurityRWD - Microsoft 365 Makes Collaboration Easy – Almost Too Easy

Kilian Englert

Kilian Englert

Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team examine different types of sharing in Microsoft 365, and what really happens behind the scenes.

Identify and Investigate Business Email Compromise (BEC) Scams

Ed Lin

Ed Lin

In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

SecurityRWD - What Happens When You Create A Microsoft Team?

Kilian Englert

Kilian Englert

Microsoft Teams seems like a straightforward collaboration platform, but the deceptive simplicity hides the true complexity lurking just under the surface.

SecurityRWD – Understanding Salesforce Entitlements

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 73 - What is a Cloud Access Security Broker (CASB)?

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 72 - What is SaaS Security Posture Management (SSPM)?

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

Threat Update 69 - What is Secure Access Service Edge (SASE)?

Kilian Englert

Kilian Englert

Kilian and Ryan O'Boyle from the Varonis Cloud Architecture team cover what Secure Access Service Edge (SASE) is all about, and dive into other security considerations organizations should keep in mind when looking to "decentralize" their network architecture.

What is an APT?: Advanced Persistent Threat Overview

Josue Ledesma

Josue Ledesma

Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.

What is a Brute Force Attack? Definition

Michael Buckbee

Michael Buckbee

A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.