Varonis
Follow
2646 Followers
Follow Varonis on their other social channels!
About Us
Founded:
2005
Company Size:
501-1000 employees
Company Type:
Public
Location:
New York, NY
Website:
Varonis is a leading provider of software solutions that protect data from insider threats and cyber attacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email system ...
Read more
Promoted Content
Our 2018 Cybersecurity Predictions
Follow
The Security of Legacy Systems
It’s our first show of 2018 and we kicked off the show with predictions that could potentially drive headline news. By doing so, we’re figuring out different ways to prepare and prevent future cybersecurity attacks. What’s notable is that IBM set up a cybersecurity lab, where organizations can experience what it’s like go through a cyberattack without any risk to their existing production system. This is extremely helpful for companies with legacy systems that might find ...
Follow
Who is in Control? The Data or Humans?
Self-quantified trackers made possible what was once nearly unthinkable: for individuals to gather data on one’s activity level in order to manage and improve one’s performance. Some have remarked that self-quantified devices can hinge on the edge of over management. As we wait for more research reports on the right dose of self-management, we’ll have to define for ourselves what the right amount of self-quantifying is. Meanwhile, it seems that businesses are also struggling w ...
Follow
Security and Privacy Concerns with Chatbots, Trackers, and more
The end of the year is approaching and security pros are making their predictions for 2018 and beyond. So are we! This week, our security practitioners predicted items that will become obsolete because of IoT devices. Some of their guesses - remote controls, service workers, and personal cars. Meanwhile, as the business world phase out old technologies, some are embracing the use of new ones. For instance, many organizations today use chatbots. Yes, they’ll help improve customer service. ...
Follow
The Challenges and Promise of Digital Drugs
Recently the Food and Drug Administration approved the first digital pill. This means that medicine embedded with a sensor can tell health care providers – doctors and individuals the patient approves – if the patient takes his medication. The promise is huge. It will ensure a better health outcome for the patient, giving caretakers more time with the ones they love. What’s more, by learning more about how a drug interacts with a human system, researchers might find a way to pr ...
Follow
Privacy Attorney Tiffany Li and AI Memory, Part II
Tiffany C. Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes and speaks on the privacy implications of artificial intelligence, virtual reality, and other technologies. Our discussion is based on her recent paper on the difficulties with getting AI to forget. In this second part, we continue our discussion of GDPR and privacy, and then explore some cutting edge areas of law and technology. Can AI algorithms own their creative e ...
Follow
Privacy Attorney Tiffany Li and AI Memory, Part i
Tiffany C. Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes and speaks on the privacy implications of artificial intelligence, virtual reality, and other technologies. Our discussion is based on her recent paper on the difficulties with getting AI to forget. In this first part ,.we talk about the GDPR's "right to be forgotten" rule nd the gap between technology and the law.
Follow
Bring Back Dedicated and Local Security Teams
Last week, I came across a tweet that asked how a normal user is supposed to make an informed decision when a security alert shows up on his screen. Great question! I found a possible answer to that question at New York Times director of infosecurity, Runa Sandvik’s recent keynote at the O’Reilly Security Conference. She told the attendees that many moons ago, Yahoo had three types of infosecurity departments: core, dedicated and local. Core was the primary infosec department. The ...
Follow
89
[CPE Webinar] 4 Tips for Fighting Insider Threats
Wednesday, Nov 15th | 2:00pm ESTRegister: http://bit.ly/2j9EjRvBadRabbit, NotPetya, and WannaCry all spread laterally via SMB exploits once they’re inside your network. It only takes one compromised user. Then they encrypt, escalate, and spread. Fast. Insiders with oversubscribed access represent a massive security risk.A comprehensive insider threats program not only considers malicious employees, but also factors in external attacks that rely on insiders to do damage and persist on the netwo ...
Follow
Rita Gurevich, CEO of SPHERE Technology Solutions
[sc name='podcast' episode='10d3c132'] Long before cybersecurity and data breaches became mainstream, founder and CEO of SPHERE Technology Solutions, Rita Gurevich built a thriving business on the premise of assisting organizations secure their most sensitive data from within, instead of securing the perimeter from outside attackers. And because of her multi-faceted experiences interacting with the C-Suite, technology vendors, and others in the business community, we thought listening to her s ...
Follow
The Moral Obligation of Machines and Humans
Critical systems once operated by humans are now becoming more dependent on code and developers. There are many benefits to machines and automation such as increased productivity, quality and predictability. But when websites crash, 911 systems go down or when radiation-therapy machines kill patients because of a software error, it’s vital that we rethink our relationship with code and as well as the moral obligations of machines and humans. Should developers who create software that imp ...
Follow
Free tomorrow at 9am EST?  Join our GDPR webinar.  It covers the info that you need to know - like the new requirements of the adopted GDPR, how to address & implement changes as well as the consequences of non compliance. See you there! http://hubs.ly/H07xpql0
Follow
Free tomorrow at 9am EST?  Join our GDPR webinar.  It covers the info that you need to know - like the new requirements of the adopted GDPR, how to address implement changes and the consequences of non compliance. http://hubs.ly/H07xpql0

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Why Do You Need a VPN?
Views: 767 / January 21, 2018
How to Evade AV with OWASP-ZSC – Part 1
Views: 1063 / January 20, 2018
Tracking IP info with its Metadata
Views: 1869 / January 19, 2018
UNMASKED: Skygofree, FISA, and Google
Views: 1510 / January 19, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel