David Harrington

Latest articles

A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance

David Harrington

David Harrington

CCPA Compliance: Everything you need to know about protecting user data under the California Consumer Privacy Act.

HIPAA Compliance: Your Complete 2023 Checklist

David Harrington

David Harrington

Is your organization ready to comply with 2023 HIPAA updates and changes? Ensure HIPAA compliance with your comprehensive 2023 checklist.

The 12 PCI DSS Requirements: 4.0 Compliance Checklist

David Harrington

David Harrington

Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) is right around the corner. Prepare with our PCI DSS compliance checklist.

U.S. Privacy Laws: The Complete Guide

David Harrington

David Harrington

This guide breaks down the entirety of the U.S. privacy law ecosystem to help you understand the rights and obligations of citizens and businesses.

SOC 2 Compliance Definition & Checklist

David Harrington

David Harrington

System and Organization Controls (SOC 2) compliance requires adherence to specific guidelines. This detailed definition and checklist can get you started.

What Is a Privacy Impact Assessment (PIA)?

David Harrington

David Harrington

A privacy impact assessment (PIA) helps firms protect data. Find out about this robust approach to data loss prevention and how to implement your own PIA.

Data Lifecycle Management (DLM): Everything You Need to Know

David Harrington

David Harrington

Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.

What is SSPM? Overview + Guide to SaaS Security Posture Management

David Harrington

David Harrington

SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.

SOX Compliance Checklist & Audit Preparation Guide

David Harrington

David Harrington

The Sarbanes-Oxley Act (SOX) requires public U.S. companies meet strict reporting and security standards. Here’s what you need to know to comply with SOX.

What is Red Teaming? Methodology & Tools

David Harrington

David Harrington

Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.

Ryuk Ransomware: Breakdown and Prevention Tips

David Harrington

David Harrington

Ryuk ransomware targets large organizations and spreads with deadly speed. Learn about the strain and how to prevent your company from becoming a victim.

Group Policy Objects (GPOs): How They Work & Configuration Steps

David Harrington

David Harrington

Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.

Prev

1 2 3

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.