
David Harrington
David is a professional writer and thought leadership consultant for enterprise technology brands, startups and venture capital firms.
-
Data Security
Mar 10, 2023
A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance
CCPA Compliance: Everything you need to know about protecting user data under the California Consumer Privacy Act.
David Harrington
10 min read
-
Privacy & Compliance
Oct 03, 2022
The 12 PCI DSS Requirements: 4.0 Compliance Checklist
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) is right around the corner. Prepare with our PCI DSS compliance checklist.
David Harrington
8 min read
-
Privacy & Compliance
Sep 02, 2022
U.S. Privacy Laws: The Complete Guide
This guide breaks down the entirety of the U.S. privacy law ecosystem to help you understand the rights and obligations of citizens and businesses.
David Harrington
9 min read
-
Privacy & Compliance
Aug 26, 2022
SOC 2 Compliance Definition & Checklist
System and Organization Controls (SOC 2) compliance requires adherence to specific guidelines. This detailed definition and checklist can get you started.
David Harrington
6 min read
-
Privacy & Compliance
Jul 22, 2022
What Is a Privacy Impact Assessment (PIA)?
A privacy impact assessment (PIA) helps firms protect data. Find out about this robust approach to data loss prevention and how to implement your own PIA.
David Harrington
6 min read
-
Data Security
Jul 08, 2022
Data Lifecycle Management (DLM): Everything You Need to Know
Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.
David Harrington
6 min read
-
Data Security
Jul 01, 2022
What is SSPM? Overview + Guide to SaaS Security Posture Management
SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.
David Harrington
8 min read
-
Privacy & Compliance
Jun 30, 2022
SOX Compliance Checklist & Audit Preparation Guide
The Sarbanes-Oxley Act (SOX) requires public U.S. companies meet strict reporting and security standards. Here’s what you need to know to comply with SOX.
David Harrington
9 min read
-
Data Security
Jun 29, 2022
What is Red Teaming? Methodology & Tools
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.
David Harrington
11 min read
-
Ransomware
Jun 25, 2022
Ryuk Ransomware: Breakdown and Prevention Tips
Ryuk ransomware targets large organizations and spreads with deadly speed. Learn about the strain and how to prevent your company from becoming a victim.
David Harrington
6 min read
-
Active Directory
Jun 15, 2022
Group Policy Objects (GPOs): How They Work & Configuration Steps
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
David Harrington
6 min read
-
Data Security
Jun 15, 2022
Data Protection Guide: How To Secure Google Drive for Your Business
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
David Harrington
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital