Latest articles
Data Protection Guide: How To Secure Google Drive for Your Business
Jun 15, 2022
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
What Is Data Governance? Framework and Best Practices
Jun 07, 2022
Data Governance helps organize, secure, and standardize data for all types of organizations. Learn more about data governance frameworks here.
NIST 800-171 Compliance Checklist and Terminology Reference
Jun 02, 2022
Government contractors who handle Controlled Unclassified Information (CUI) must be NIST 800-171 compliant. Use this checklist as a complete reference.
Your Guide to Simulated Cyberattacks: What is Penetration Testing?
Mar 31, 2022
Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.
What is Terraform: Everything You Need to Know
Mar 30, 2022
Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.
Ransomware-as-a-Service Explained: What is RaaS?
Feb 25, 2022
Ransomware as a service (RaaS) is an emerging and potent cybersecurity threat to all organizations. If you’re unaware of how RaaS works, your system is potentially at risk. What RaaS is and how to guard against it.
How to Monitor Network Traffic: Effective Steps & Tips
Nov 18, 2021
In this article, you will learn how to monitor network traffic using different tools and methods.
What is a Security Operations Center (SOC)?
Nov 17, 2021
What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.
The MITRE ATT&CK Framework: A Comprehensive Guide
Oct 25, 2021
The MITRE ATT&CK framework helps businesses discover which hacker techniques, tactics, and behaviors they're most vulnerable to. Read about how to use ATT&CK for penetration testing within your organization today.
Illinois Privacy Law Compliance: What You Need to Know
Oct 20, 2021
The Illinois Personal Information Protection Act (PIPA) is designed to safeguard the personal data of Illinois residents. Learn what PIPA is, who it affects, and how to maintain compliance.
Password Spraying: What to Do and Prevention Tips
Oct 15, 2021
Using common or overly simplistic passwords can make users and organizations vulnerable to password spraying. Learn what password spraying attacks are, how they work, and what you can do to prevent one.
Microsoft LAPS Overview: Setup, Installation, and Security
Sep 28, 2021
Learn the basics of Microsoft LAPS to keep users from gaining unauthorized access to your system. Contact us for help with your data protection needs.
Try Varonis free.
Deploys in minutes.