health-spreadsheet-tilted

The Worst Assumption You Can Make About Healthcare Information

There’s a common misconception that HIPAA only applies to database records. It’s somewhat understandable because “health record” is used frequently on the Health and Human Services (HHS) web site. However, if you read the actual language of HIPAA more closely, you’ll see that the rules cover protected health information (PHI) in any electronic format. Have…

Traitorware

PoS Cyber Attack Insight: Malware Isn’t What You Think It is

As headlines over the last few months have shown, hackers are becoming more and more resourceful at getting through corporate firewalls to directly attack retail terminals and back-end PoS servers. If IT can’t stop them from getting through the front door, is there a second line of defense to, at a minimum, contain the cyber-thieves…

Exchange Public Folder Migration Guide

Many organizations rely on Exchange’s public folders to store emails, documents, calendars, tasks, and more.  Over time, with substantial and frequent use, emails pile up, and many organizations want to know: Is anyone using all of this content? Who does it belong to? Is the sensitive stuff protected? Should we get rid of it or…

Unique Offerings + Rapid Growth = Prestigious Industry Recognition for Varonis

Much of the recent talk in the IT industry has revolved around the fates of traditional IT giants. Rumors of mergers, breakups, and divestments often miss one of the underlying factors creating this turbulence: customers want innovation and they are finding it with fresh approaches from newer players. Our relentless passion to innovate for our…

dhs - backoff

Driving a Stake through Backoff and other PoS Malware

Despite a US CERT warning and several well-publicized hacking incidents over the summer, Backoff malware continues to add new corporate victims. Krebs has been on the case and has more details on the most recent attacks against two well-known brands. The government warning pointed out that anti-virus vendors may not have the latest signatures for…

Blank computer screen

Miscommunication as a Cybersecurity Threat

There was a great interview in WSJ this weekend with Blackstone’s CISO Jay Leek.  They asked Mr. Leek a question that I love asking people in high-level security roles: WSJ: What most worries you? LEEK: The No. 1 most significant risk to every organization is your well-intentioned, nonmalicious insider who is trying to do the…

[VIDEO] Why Work At Varonis

Below you’ll find a video we’re really happy to share with you. While watching the video, you’ll get a real sense of what it’s like to work at Varonis. You’ll hear directly from employees on the company culture, and perks – while getting a glimpse of our offices in the heart of Manhattan. We hope…

personality-traits-more-prone-to-phishing

Do Certain Traits Make People Vulnerable to Phishing?

The Computer Emergency Response Team (CERT) at Carnegie-Mellon University is a research institute devoted to computer and network security. CERT is often referenced by other security researchers, and for good reason: they have deep knowledge of vulnerabilities and have developed cyber-engineering techniques both to analyze and prevent attacks. CERT also has an entire practice area…

Announcing the Varonis Connect Community

Do you have feature requests for us?  Ever want to discuss a product customization with an engineer?  Looking for a certain how-to video?  Look no further!  Today, we’re happy to announce a new online community for Varonis customers and partners. Varonis Connect is a friendly community where you can exchange ideas and information, participate in…

Announcing DatAnywhere 2.0

We’re pleased to announce that version 2.0 of Varonis DatAnywhere is now generally available. Our engineering team continues to add new features at a rapid pace! What’s new in 2.0? Stub files. Stub files make files appear and behave as if they’re stored locally on the client, but they remain safely on your file shares…