Today, we announced the acquisition of AllTrue.ai, an AI Trust, Risk, and Security Management (AI TRiSM) company that helps organizations understand and control how AI systems behave across the enterprise.
The acquisition of AllTrue.ai brings rea...
Want to keep yourself up to date with the latest news from Varonis Blog?
Subscribe using the "Follow" button below and we provide you with customized updates, via topic or tag, that get delivered to your email address, your smartphone or on your dedicated news page on follow.it.
You can unsubscribe at any time painlessly.
Title of Varonis Blog: "Varonis Blog | All Things Data Security"
Is this your feed? Claim it!
Today, we announced the acquisition of AllTrue.ai, an AI Trust, Risk, and Security Management (AI TRiSM) company that helps organizations understand and control how AI systems behave across the enterprise.
The acquisition of AllTrue.ai brings rea...
Data discovery has become an important part of every data security program. From prioritizing efforts to tightening permissions to deciding where to place compensating controls, a map of sensitive data helps prioritize remediation of controls and informs detection.
In the cloud, basic data discovery is easier than in on-premises data stores. Where...
Varonis Threat Labs discovered ways to abuse Outlook add-ins, a core feature of the Microsoft 365 ecosystem, to exfiltrate sensitive data from organizations without leaving any forensic traces. We’ve dubbed this attack method Exfil Out&Look.
A...
When it comes to securing data, speed matters. While many DSPM vendors promise quick onboarding, their deployments often stretch into days or weeks due to complex prerequisites and manual configurations.
Browser-based attacks have entered a new phase, one that's more aggressive, more coordinated, and more dangerous than what we saw a few months ago. An attack vector once considered low-impact has become a huge threat targeting millions of online users.
In December 2025,