Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
Threat Update 27 – Concentrations of Power
Kilian Englert
February 25, 2021
Why are there certain account types that are often targeted by attackers? Why can it be really difficult to detect certain types of account misuse? What are some of the biggest AD hygiene issues we run into?
Threat Update 55 – SSO Imposter: Targeting Google
Kilian Englert
September 15, 2021
In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can…
Is Your Data Insider-Proof? Five Steps To Keep Your Secrets Safe
Yaki Faitelson
August 2, 2023
This article explains the five steps you can take to see how prepared you are for a nefarious insider or an outside attacker that compromises an insider's account or computer.
Why Every Cybersecurity Leader Should ‘Assume Breach’
Yaki Faitelson
May 16, 2022
Any system, account or person at any time can be a potential attack vector. With such a vast attack surface, you need to assume attackers will breach at least one vector.