Varonis
Follow
2617 Followers
Follow Varonis on their other social channels!
About Us
Founded:
2005
Company Size:
501-1000 employees
Company Type:
Public
Location:
New York, NY
Website:
Varonis is a leading provider of software solutions that protect data from insider threats and cyber attacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email system ...
Read more
Promoted Content
[Whitepaper] The Complete Guide to Ransomware
Follow
Roxy Dee, Threat Intelligence Engineer
Some of you might be familiar with Roxy Dee’s infosec book giveaways. Others might have met her recently at Defcon as she shared with infosec n00bs practical career advice. But aside from all the free books and advice, she also has an inspiring personal and professional story to share. In our interview, I learned about her budding interest in security, but lacked the funds to pursue her passion. How did she workaround her financial constraint? Free videos and notes with Professor Messer! ...
Follow
Dr. Zinaida Benenson and Phishing, Part I
Zinaida Benenson is a researcher at the University of Erlangen-Nuremberg, where she heads the "Human Factors in Security and Privacy" group. She and her colleagues conducted a fascinating study into why people click on what appears to be obvious email spam. In the first part of our interview with Benenson, we discusses how she collected her results, and why curiosity seems to override security concerns when dealing with phish mail.
Follow
Are Cyber War Rooms Necessary?
While some management teams are afraid of a pentest or risk assessment, other organizations - particularly financial institutions - are well aware of their security risks. They are addressing these risks by simulating fake cyberattacks. By putting IT, managers, board members and executives who would be responsible for responding to a real breach or attack, they are learning how to respond to press, regulators, law enforcement, as well as other scenarios they might not otherwise expect. However, ...
Follow
I Click Therefore I Exist: Disturbing Research On Phishing
Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until recently, the “why” behind most people’s clicking behaviors remained something of a mystery. We now have more of an answer to this question based on findings from German academics. Warning:  IT security people will not find their conclusions very comforting... Interested? Read the rest o ...
Follow
[Podcast] John P. Carlin, Part 4: Emerging Threats
In this concluding post of John Carlin’s Lessons from the DOJ, we cover a few emerging threats: cyber as an entry point, hacking for hire and cybersecurity in the IoT era. One of the most notable anecdotes are John’s descriptions of how easy it was to find hacking for hire shops on the dark web. Reviews of the most usable usernames and passwords and most destructive botnets are widely available to shoppers. Also, expect things to get worse before they get better. With the volume of ...
Follow
[Podcast] Tracking Dots, Movement and People
Long before websites, apps and IoT devices, one primary way of learning and sharing information is with a printed document. They’re still not extinct yet. In fact, we’ve given them an upgrade to such that nearly all modern color printers include some form of tracking information that associates documents with the printer’s serial number. This type of metadata is called tracking dots. We learned about them when prosecutors alleged 25-year-old federal contractor Reality Lea ...
Follow
GDPR: Troy Hunt Explains it All in Video Course
You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day you’re in a meeting with the CEO, CSO, and CIO. When the subject of General Data Protection Regulation or GDPR comes up, all the Cs agree that there are some difficulties, but everything will be worked out. You are too afraid to ask, “What is the GDPR?” Too Busy for GDPR We’ve all been ...
Follow
[Infographic] From Bad Report Cards to Insider Data Theft
We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long as we’ve had computers and disgruntled humans who understand IT systems. You may not know it, but academic researchers have also been studying the psychological insides of insiders. Carnegie Mellon’s Computer Emergency Response Team (CERT) has an entire group devoted to insider th ...
Follow
[Podcast] John P. Carlin: Ransomware & Insider Threat (Part 3)
We continue with our series with John Carlin, former Assistant Attorney General for the U.S. Department of Justice’s National Security Division. This week, we tackle ransomware and insider threat. According to John, ransomware continues to grow, with no signs of slowing down. Not to mention, it is a vastly underreported problem. He also addressed the confusion on whether or not one should engage law enforcement or pay the ransom. And even though recently the focus has been on ransomware a ...
Follow
[Podcast] Security Pros and Users: We’re All in This Together
The latest release of SANS’ Security Awareness Report attributed communication as one of the primary reasons why awareness programs thrive or fail. Yes, communication is significant, but what does communication mean? “The goal of communication is to facilitate understanding,” said Inside Out Security Show(IOSS) panelist, Mike Thompson. Another panelist, Forrest Temple expanded on that idea, “The skill of communication is the clarity through which that process happens. Be ...
Follow
Free tomorrow at 9am EST?  Join our GDPR webinar.  It covers the info that you need to know - like the new requirements of the adopted GDPR, how to address & implement changes as well as the consequences of non compliance. See you there! http://hubs.ly/H07xpql0
Follow
Free tomorrow at 9am EST?  Join our GDPR webinar.  It covers the info that you need to know - like the new requirements of the adopted GDPR, how to address implement changes and the consequences of non compliance. http://hubs.ly/H07xpql0

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel