Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Michael Buckbee
August 10, 2020
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
How Major Companies Find Leaks
Rob Sobers
March 29, 2020
Learn how major companies like Google and Facebook detect leaks and see what techniques you can use to protect your company from attacks.
The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees
Rachel Hunt
September 14, 2021
Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…
Threat Update 54 – SSO Imposter: Intrusion
Kilian Englert
September 7, 2021
Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…