New Year, New Identity? 👀

New Year, New Identity? 👀

Welcome to the Security Stack on LinkedIn! This month, you'll get the latest threat and security reasearch from security experts, discover your new favorite cybersecurity podcast, and deep dive into the most recent breach headlines.

🪪 57% of Cyberattacks Start With Compromised Identity

Today's cyberattacks seem sophisticated, but the truth is that they're logging in. Protecting identities, keeping bad actors out of your environment, and stopping them from stealing your data will still be important in 2025, and our team has the research to prove it!

Dive into The Identity Crisis, our newest research report, to learn the team's findings and how your organization can proactively prevent breaches. 

I want the report!


⚡️Energy Company Safeguards Critical Data in AWS + M365

With Varonis, this energy company saved thousands of hours with automation, locked down AWS S3 buckets, and demonstrated compliance with SEC reporting requirements in the U.S. and the GDPR in the EU.

Learn how they did it and get some inspiration for your own security level-up!

Show me the details!


⭕️ Welcome to The CISO Circle


If you're in the trenches of IR or building a security culture that sticks, this podcast is for you! Hosted by security leader Aftab Banth and Varonis' very own Scott Shafer , this duo laughs, rants, and commiserates about the day-to-day life of leading security teams.

Watch episode one today!

Take me to the circle!


🚨Unmasking Advanced Phishing Tactics | Threat Research

Our forensics team investigated a clever phishing campaign in which a malicious email enabled a threat actor to access the organization. This blog, featured in Bleeping Computer, reveals the tactics used to avoid detection and shares the IoCs discovered during the investigation. 

Show me the info!


🎥 Must-See TV From Team Varonis

1. U.S. Treasury Breach with the State of Cybercrime | Episode 31

In this episode of State of Cybercrime episode, co-hosts Matthew Radolec and David Gibson cover the most recent Chinese state-sponsored APT attack by Silk Typhoon on the U.S. Treasury Department, including how the attackers used a remote support tool to enable unauthorized access to Treasury workstations and unclassified documents.

Show me the latest episode!

2. Varonis CFO Talks SaaS Transitions | Run the Numbers Podcast

Guy Melamed , Varonis CFO and COO, and host CJ Gustafson , delve into the challenges of SaaS transitions, the pressure of doing them in the public eye, and how to communicate these processes to customers, investors, and sales reps, along with other helpful insights.

I want to watch the show!

3. The One Thing Every Cyberattack Has in Common

Our security experts break down the common denominator found in every cyberattack.

Tell me more!

4. European Commission Gets Fined For GDPR Violation

The European Commission was issued a small fine for violating GDPR after transferring German citizens' data, and the State of Cybercrime hosts broke down the details.

Tell me the details!


🤖 Applying NIST CSF 2.0 to Microsoft 365 Copilot

Discover how to apply the new NIST CSF 2.0 to Microsoft 365 Copilot, including approaches for each major category in the framework and how Varonis can help.

Take me to the blog!


What would you like to see in the next edition of the Security Stack? Let us know in the comments!

To view or add a comment, sign in

More articles by Varonis

Explore topics