Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
Threat Update 23 - Bypassing Endpoint Controls Using Office Macros
Kilian Englert
February 1, 2021
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
Threat Update 48 - Using Google to Spot Exposed Data in the Cloud
Kilian Englert
July 23, 2021
Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks.
Threat Update 28 – Re-Ryuk’ed & Exchange Zero-Day
Kilian Englert
March 4, 2021
Is it too soon for a 2020 throwback? The Ryuk ransomware gang certainly doesn’t think so! It looks like one of the premiere ransomware-as-a-service groups was not content to rest on their laurels, and it appears they’ve added self-spreading capabilities.
How to Configure Varonis and EMC Isilon
Rob Sobers
April 21, 2014
Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc. Varonis is the perfect fit. With our...