Blog

Data Security

Varonis Named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Avia Navickas

Avia Navickas

Varonis Named a Leader in the Forrester Wave™: Data Security Platforms, Q1 2023, receiving the highest score in the strategy category.

A Step-By-Step Guide to California Consumer Privacy Act (CCPA) Compliance

David Harrington

David Harrington

CCPA Compliance: Everything you need to know about protecting user data under the California Consumer Privacy Act.

What a data leak is and tips from Varonis on how you can prevent them

What Is a Data Leak? Definition and Prevention Tips

Nolan Necoechea

Nolan Necoechea

Learn why data leaks can be devastating for companies and how you can defend against them.

What Is Zero Trust? Architecture and Security Guide

Michael Buckbee

Michael Buckbee

Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.

What is Mimikatz? The Beginner's Guide

Michael Buckbee

Michael Buckbee

Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.

How to Use Wireshark: Comprehensive Tutorial + Tips

Kody Kinzie

Kody Kinzie

Learn how to use Wireshark, a widely-used network packet and analysis tool. This tutorial has everything from downloading to filters to packets.

What Is SQL Injection? Identification & Prevention Tips

Alvin Mwambi

Alvin Mwambi

SQL injection is a serious open web application security project (OWASP) vulnerability. Learn more about how to combat injection attacks in this article.

Cybersecurity statistics

157 Cybersecurity Statistics and Trends [updated 2024]

Rob Sobers

Rob Sobers

These cybersecurity statistics for 2024 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, & job outlook.

Data Lifecycle Management (DLM): Everything You Need to Know

David Harrington

David Harrington

Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.

What is the CIA Triad?

Josue Ledesma

Josue Ledesma

Learn how the CIA triad can be used to classify, secure, and protect your data.

What Is Network Access Control? Explaining NAC Solutions

Robert Grimmick

Robert Grimmick

Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.

Ransomware Statistics, Data, Trends, and Facts [updated 2024]

Rob Sobers

Rob Sobers

Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.