
Robert Grimmick
Robert is an IT and cyber security consultant based in Southern California. He enjoys learning about the latest threats to computer security.
-
Cloud Security
Oct 14, 2022
What is IDOR (Insecure Direct Object Reference)?
Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.
Robert Grimmick
6 min read
-
Data Security
Jul 07, 2022
What Is Network Access Control? Explaining NAC Solutions
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.
Robert Grimmick
10 min read
-
Data Security
Jun 29, 2022
What is a Security Policy? Definition, Elements, and Examples
A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.
Robert Grimmick
9 min read
-
Data Security
Jun 25, 2022
What is Traceroute? How It Works and How to Read Results
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.
Robert Grimmick
10 min read
-
Data Security
Jun 24, 2022
What is an Insider Threat? Definition and Examples
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.
Robert Grimmick
7 min read
-
Data Security
Jun 16, 2022
What is Cyber Espionage? Complete Guide with Protection Tips
Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.
Robert Grimmick
11 min read
-
Privacy & Compliance
Jun 03, 2022
ISO 27001 Compliance Guide: Essential Tips and Insights
Looking to earn ISO 27001 compliance? Learn about this widely known information security standard, what’s in it, and how to become certified.
Robert Grimmick
9 min read
-
Data Security
Aug 18, 2021
How to Fix Broken Registry Items: Visual Guide and Solutions
Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.
Robert Grimmick
7 min read
-
Data Security
Aug 05, 2021
Packet Capture: What is it and What You Need to Know
Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.
Robert Grimmick
9 min read
-
Data Security
Jun 25, 2021
SIEM Tools: 9 Tips for a Successful Deployment
Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…
Robert Grimmick
7 min read
-
Data Security
Jun 17, 2021
Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX
Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…
Robert Grimmick
7 min read
-
Data Security
Apr 27, 2021
ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks
ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…
Robert Grimmick
8 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital