-
Data Security
Jul 08, 2022
157 Cybersecurity Statistics and Trends [updated 2024]
Cybersecurity is a day-to-day operation for many businesses, but it’s not a small task to stay on top of what’s been going on over the past year or so.
Rob Sobers
13 min read
-
Data Security
Jul 08, 2022
Data Lifecycle Management (DLM): Everything You Need to Know
Thomas Redman, aka the Data Doc, hit the nail on the head when he said "Where there is data smoke, there is business fire." As data is now the most important asset of most organizations, data breaches, mishandling, or loss can and will cause significant disruption across many areas of operations. And to mitigate these risks, you’ll need to implement Data Lifecycle Management (DLM).
David Harrington
6 min read
-
Data Security
Jul 08, 2022
What is the CIA Triad?
When most people think of the CIA, they picture suits and ties, espionage, and James Bond. But the CIA triad (which stands for confidentiality, integrity, and availability) protects organizations from a different type of danger. The CIA triad we’ll be discussing is a security model designed to guide an organization in establishing its security infrastructure. It consists of key principles and objectives for information security programs and strategy development.
Josue Ledesma
5 min read
-
Data Security
Jul 07, 2022
What Is Network Access Control? Explaining NAC Solutions
Frustrated with the slow wifi speed in my hotel room — and irritated at the hard upsell to a “premium” tier speed — I took matters into my own hands and plugged my travel router directly into the hotel's unthrottled wired network. I didn’t actually expect this to work; surely an international hospitality chain would have some sort of basic network access control (NAC) in place. But my instantaneous speed upgrade suggested two things: 1) I was successful in my quest, and 2) this hotel group might need to work on network security.
Robert Grimmick
10 min read
-
Data Security
Jul 05, 2022
Ransomware Statistics, Data, Trends, and Facts [updated 2024]
Ransomware is a form of malicious software that infiltrates a computer or network and limits or restricts access to critical data by encrypting files until a ransom is paid. The first use of ransomware dates back to 1989, when floppy disks were high-tech and the price of the ransom was a mere $189.
Rob Sobers
11 min read
-
Data Security
Jul 01, 2022
What is SSPM? Overview + Guide to SaaS Security Posture Management
Companies today rely on dozens to hundreds of software-as-a-service (SaaS) applications for their workload, data, and processes. The lower costs, ease of use, scalability, and integration capabilities of SaaS apps offers an attractive alternative to on-premise solutions. But as with all cyber offerings, SaaS apps are susceptible to attacks and so the need for SaaS security posture management (SSPM) was born.
David Harrington
8 min read
-
Privacy & Compliance
Jun 30, 2022
SOX Compliance Checklist & Audit Preparation Guide
The passing of the Sarbanes-Oxley Act (SOX) in 2002 established rules to protect the public from fraudulent or predatory practices by corporations and other business entities. The act increased transparency in financial reporting by corporations, and established a system of internal corporate checks and balances.
David Harrington
9 min read
-
Data Security
Jun 30, 2022
IDS vs. IPS: What Organizations Need to Know
Network administrators need to employ tools to protect their network and prevent malicious actors from gaining access. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are categories of tools commonly used for this purpose. It’s important to know the difference between them, which are best for certain types of organizations, and how to maximize their effectiveness.
Josue Ledesma
5 min read
-
Data Security
Jun 30, 2022
DNS over HTTPS as a covert Command and Control channel
DNS is known as one of the most fundamental and important protocols of the TCP\IP stack. We rely on DNS for the most basic online activities (like watching cat videos on Instagram).
Masha Garmiza
4 min read
-
Data Security
Jun 29, 2022
What is Red Teaming? Methodology & Tools
It may seem counterintuitive to pay someone to tell you your shortcomings, but smart companies today are shelling out dollars and resources to do just that, in the form of red teaming. Red teaming is the practice of testing the security of an organization’s systems by emulating a malicious actor and hacking into secure systems or data. A red team can be an externally contracted group of penetration testers or a team within your own organization, designed to hack your system to prepare for a wide variety of cyberattacks and breach scenarios before they occur. If your organization has outstanding penetration testing tools and endpoint detection processes, for instance, red teams may try phishing or breaching physical access controls during a simulation.
David Harrington
11 min read
-
Data Security
Jun 29, 2022
What is a Security Policy? Definition, Elements, and Examples
Raise your hand if the question, “What are we doing to make sure we are not the next ransomware victim?” is all too familiar. If you’re a CISO, CIO, or IT director you’ve probably been asked that a lot lately by senior management. While it might be tempting to try out the latest one-trick-pony technical solution, truly protecting your organization and its data requires a broad, comprehensive approach. And there’s no better foundation for building a culture of protection than a good information security policy.
Robert Grimmick
9 min read
-
Data Security
Jun 29, 2022
What is Open XDR? Benefits and Security Comparisons
In an ever-changing cybersecurity environment, organizations must adapt their security tech stack in order to better secure themselves. As environments get more complicated, open XDR has emerged as an advanced detection and response tool companies should consider.
Josue Ledesma
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital