Josue Ledesma

Latest articles

What is the CIA Triad?

Josue Ledesma

Josue Ledesma

Learn how the CIA triad can be used to classify, secure, and protect your data.

IDS vs. IPS: What Organizations Need to Know

Josue Ledesma

Josue Ledesma

We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.

What is Open XDR? Benefits and Security Comparisons

Josue Ledesma

Josue Ledesma

Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

Evil Twin Attack: What it is, How to Detect & Prevent it

Josue Ledesma

Josue Ledesma

The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.

A dark blue checklist titled NIST 800-53 COMPLIANT floats over a blue gradient background.

NIST 800-53: Definition and Tips for Compliance

Josue Ledesma

Josue Ledesma

Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.

Two certifications shown on an aquamarine gradient background: One for CCSP and one for CISSP.

CCSP vs. CISSP: Which One Should You Take?

Josue Ledesma

Josue Ledesma

Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.

What Is a Botnet? Definition and Prevention

Josue Ledesma

Josue Ledesma

Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.

What is an APT?: Advanced Persistent Threat Overview

Josue Ledesma

Josue Ledesma

Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.

gMSA Guide: Group Managed Service Account Security & Deployment

Josue Ledesma

Josue Ledesma

Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.

What is Two-Factor Authentication (2FA) and Why Should You Use It?

Josue Ledesma

Josue Ledesma

Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.

What is Threat Modeling and How To Choose the Right Framework

Josue Ledesma

Josue Ledesma

Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.

Everything You Need to Know About Cyber Liability Insurance

Josue Ledesma

Josue Ledesma

Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity…

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.