-
Data Security
Jul 07, 2022
What Is Network Access Control? Explaining NAC Solutions
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.
Robert Grimmick
10 min read
-
Data Security
Jul 05, 2022
Ransomware Statistics, Data, Trends, and Facts [updated 2024]
Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.
Rob Sobers
11 min read
-
Data Security
Jul 01, 2022
What is SSPM? Overview + Guide to SaaS Security Posture Management
SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.
David Harrington
8 min read
-
Privacy & Compliance
Jun 30, 2022
SOX Compliance Checklist & Audit Preparation Guide
The Sarbanes-Oxley Act (SOX) requires public U.S. companies meet strict reporting and security standards. Here’s what you need to know to comply with SOX.
David Harrington
9 min read
-
Data Security
Jun 30, 2022
IDS vs. IPS: What Organizations Need to Know
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
Josue Ledesma
5 min read
-
Data Security
Jun 30, 2022
DNS over HTTPS as a covert Command and Control channel
Learn how DNS over HTTPS (DoH) is being actively used as a Command and Control (C2) channel by threat actors.
Masha Garmiza
4 min read
-
Data Security
Jun 29, 2022
What is Red Teaming? Methodology & Tools
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.
David Harrington
11 min read
-
Data Security
Jun 29, 2022
What is a Security Policy? Definition, Elements, and Examples
A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.
Robert Grimmick
9 min read
-
Data Security
Jun 29, 2022
What is Open XDR? Benefits and Security Comparisons
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
Josue Ledesma
5 min read
-
Data Security
Jun 25, 2022
What is Traceroute? How It Works and How to Read Results
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.
Robert Grimmick
10 min read
-
Ransomware
Jun 25, 2022
Ryuk Ransomware: Breakdown and Prevention Tips
Ryuk ransomware targets large organizations and spreads with deadly speed. Learn about the strain and how to prevent your company from becoming a victim.
David Harrington
6 min read
-
Data Security
Jun 24, 2022
What is an Insider Threat? Definition and Examples
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.
Robert Grimmick
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital