
Josue Ledesma
Josue Ledesma is a writer, filmmaker, and content marketer living in New York City. He covers information security, tech and finance, consumer privacy, and B2B digital marketing. You can see his writing portfolio on https://josueledesma.com/Writing-Portfolio
-
Data Security
Jul 08, 2022
What is the CIA Triad?
Learn how the CIA triad can be used to classify, secure, and protect your data.
Josue Ledesma
5 min read
-
Data Security
Jun 30, 2022
IDS vs. IPS: What Organizations Need to Know
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
Josue Ledesma
5 min read
-
Data Security
Jun 29, 2022
What is Open XDR? Benefits and Security Comparisons
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
Josue Ledesma
5 min read
-
Data Security
Jun 24, 2022
Evil Twin Attack: What it is, How to Detect & Prevent it
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
Josue Ledesma
5 min read
-
Privacy & Compliance
Jun 03, 2022
NIST 800-53: Definition and Tips for Compliance
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
Josue Ledesma
4 min read
-
Data Security
Apr 07, 2022
CCSP vs. CISSP: Which One Should You Take?
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
Josue Ledesma
5 min read
-
Data Security
Mar 18, 2022
What Is a Botnet? Definition and Prevention
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
Josue Ledesma
4 min read
-
Data Security
Dec 08, 2021
What is an APT?: Advanced Persistent Threat Overview
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
Josue Ledesma
4 min read
-
Data Security
Oct 12, 2021
gMSA Guide: Group Managed Service Account Security & Deployment
Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Threat Modeling and How To Choose the Right Framework
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
Josue Ledesma
5 min read
-
Data Security
Jul 07, 2021
Everything You Need to Know About Cyber Liability Insurance
Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity…
Josue Ledesma
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital