Latest articles
What is the CIA Triad?
Jul 08, 2022
Learn how the CIA triad can be used to classify, secure, and protect your data.
IDS vs. IPS: What Organizations Need to Know
Jun 30, 2022
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
What is Open XDR? Benefits and Security Comparisons
Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
Evil Twin Attack: What it is, How to Detect & Prevent it
Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
NIST 800-53: Definition and Tips for Compliance
Jun 03, 2022
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
CCSP vs. CISSP: Which One Should You Take?
Apr 07, 2022
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
What Is a Botnet? Definition and Prevention
Mar 18, 2022
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
What is an APT?: Advanced Persistent Threat Overview
Dec 08, 2021
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
gMSA Guide: Group Managed Service Account Security & Deployment
Oct 12, 2021
Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Aug 04, 2021
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
What is Threat Modeling and How To Choose the Right Framework
Aug 04, 2021
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
Everything You Need to Know About Cyber Liability Insurance
Jul 07, 2021
Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity…
Try Varonis free.
Deploys in minutes.