-
Data Security
Jun 15, 2022
Data Protection Guide: How To Secure Google Drive for Your Business
Google Drive has fast become one of the most used productivity and collaboration suites in the cloud. And as its popularity has risen—along with the amount of data stored on Google Drive servers—it increasingly becomes a target of hackers. Knowing how to secure Google Drive is critical to your organization’s cybersecurity posture if it’s a platform you rely on.
David Harrington
7 min read
-
Data Security
May 20, 2022
82 Must-Know Data Breach Statistics [updated 2024]
As more and more companies experience crippling security breaches, the wave of compromised data is on the rise. Data breach statistics show that hackers are highly motivated by money to acquire data, and that personal information is a highly valued type of data to compromise. It’s also apparent that companies are still not prepared enough for breaches even though they are becoming more commonplace.
Rob Sobers
11 min read
-
Data Security
Apr 12, 2022
How to Use Volatility for Memory Forensics and Analysis
If you work in incident response you understand how critical it is to pull forensically sound evidence from compromised devices as soon as possible. This is often in the form of logs or hard disk images.
Neil Fox
8 min read
-
Data Security
Apr 07, 2022
CCSP vs. CISSP: Which One Should You Take?
As part of your professional development in the cybersecurity industry, you’re likely going to face a decision on which certification you should obtain first. This usually pits CCSP and CISSP against each other and what you should choose depends on several key considerations.
Josue Ledesma
5 min read
-
Data Security
Apr 06, 2022
Unpacking NIST Cybersecurity Framework 2.0
The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) provides organizations with guidance and best practices for enhancing information security and safeguarding their networks and data.
Shawn Hays
8 min read
-
Data Security
Mar 31, 2022
Your Guide to Simulated Cyberattacks: What is Penetration Testing?
Without penetration testing, you might not recognize gaps, weaknesses, and vulnerabilities in your cyber defenses until it’s too late. A penetration test is essentially a simulation cyber-attack, where an internal team or partner will act as a hacker in an attempt to penetration your systems, data, or networks.
David Harrington
7 min read
-
Data Security
Mar 30, 2022
What is Terraform: Everything You Need to Know
Managing information technology (IT) infrastructure across multiple clouds, servers, and environments can quickly become complex and unwieldy. But one of the best ways that enterprises can operate and grow infrastructure at scale is an Infrastructure-as-code (IaC) solution called Terraform. But what is Terraform and how does it work?
David Harrington
5 min read
-
Data Security
Mar 21, 2022
How to Use Ghidra to Reverse Engineer Malware
There are numerous tools freely available to cybersecurity professionals to assist in analyzing malware. Ghidra was first released a couple of years ago and has proved to be relatively popular due to it being a free tool that can be used to disassemble malware.
Neil Fox
7 min read
-
Data Security
Mar 18, 2022
What Is a Botnet? Definition and Prevention
The majority of cyberattacks these days come in the form of automated attacks, made possible by botnets. But what is a botnet? It’s a way for hackers to leverage a collection of compromised devices to carry out various types of attacks.
Josue Ledesma
4 min read
-
Data Security
Feb 25, 2022
Common Types of Malware
It’s no secret that malware is a huge problem, whether it be an infected laptop that you use for home banking and watching Netflix, all the way to multi-million-pound organizations that store customer credit card and banking details. But what happens once a machine is infected with malware? The answer to that question depends on what type of malware has infected the device as there are different types of malware that each have their own malicious characteristics.
Neil Fox
7 min read
-
Data Security
Feb 10, 2022
Identify and Investigate Business Email Compromise (BEC) Scams
What is Business Email Compromise (BEC)? Business Email Compromise is an email-based phishing attack that specifically targets businesses and organizations to steal money, sensitive information, or account credentials. These attacks can be difficult to prevent as criminals may utilize social engineering techniques such as impersonation and intimidation to manipulate users.
Ed Lin
9 min read
-
Data Security
Dec 08, 2021
What is an APT?: Advanced Persistent Threat Overview
An advanced persistent threat or APT is an attacker that lurks within your environment for an extended period of time, drops malware and other malicious software in your environment, and exfiltrates valuable data.
Josue Ledesma
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital