Data Security
Varonis Named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023
Mar 22, 2023
Varonis Named a Leader in the Forrester Wave™: Data Security Platforms, Q1 2023, receiving the highest score in the strategy category.
A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance
Mar 10, 2023
CCPA Compliance: Everything you need to know about protecting user data under the California Consumer Privacy Act.
What Is a Data Leak? Definition and Prevention Tips
Sep 09, 2022
Learn why data leaks can be devastating for companies and how you can defend against them.
What Is Zero Trust? Architecture and Security Guide
Sep 09, 2022
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.
What is Mimikatz? The Beginner's Guide
Aug 26, 2022
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.
How to Use Wireshark: Comprehensive Tutorial + Tips
Aug 19, 2022
Learn how to use Wireshark, a widely-used network packet and analysis tool. This tutorial has everything from downloading to filters to packets.
What Is SQL Injection? Identification & Prevention Tips
Jul 22, 2022
SQL injection is a serious open web application security project (OWASP) vulnerability. Learn more about how to combat injection attacks in this article.
157 Cybersecurity Statistics and Trends [updated 2024]
Jul 08, 2022
These cybersecurity statistics for 2024 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, & job outlook.
Data Lifecycle Management (DLM): Everything You Need to Know
Jul 08, 2022
Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.
What is the CIA Triad?
Jul 08, 2022
Learn how the CIA triad can be used to classify, secure, and protect your data.
What Is Network Access Control? Explaining NAC Solutions
Jul 07, 2022
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.
Ransomware Statistics, Data, Trends, and Facts [updated 2024]
Jul 05, 2022
Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.
Try Varonis free.
Deploys in minutes.