Latest articles
What is C2? Command and Control Infrastructure Explained
Apr 26, 2021
A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence…
Endpoint Detection and Response: All You Need to Know About EDR Security
Apr 01, 2021
This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.
IPv6 Security Guide: Do you Have a Blindspot?
Jan 28, 2021
Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.
What Is Network Segmentation?
Jan 05, 2021
Network segmentation is the act of dividing a computer network into smaller physical or logical components in order to increase security and protect data.
Phishing Attacks: Types, Prevention, and Examples
Dec 23, 2020
Phishing attacks use fraud to trick users into revealing information or opening malware. They are a popular attack technique among many types of threat actors.
Try Varonis free.
Deploys in minutes.