Blog

Data Security

What is SSPM? Overview + Guide to SaaS Security Posture Management

David Harrington

David Harrington

SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.

IDS vs. IPS: What Organizations Need to Know

Josue Ledesma

Josue Ledesma

We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.

DNS over HTTPS as a covert Command and Control channel

Masha Garmiza

Masha Garmiza

Learn how DNS over HTTPS (DoH) is being actively used as a Command and Control (C2) channel by threat actors.

What is Red Teaming? Methodology & Tools

David Harrington

David Harrington

Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.

What is a Security Policy? Definition, Elements, and Examples

Robert Grimmick

Robert Grimmick

A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.

What is Open XDR? Benefits and Security Comparisons

Josue Ledesma

Josue Ledesma

Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

What is Traceroute? How It Works and How to Read Results

Robert Grimmick

Robert Grimmick

Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Robert Grimmick

Robert Grimmick

Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

Evil Twin Attack: What it is, How to Detect & Prevent it

Josue Ledesma

Josue Ledesma

The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.

What is Cyber Espionage? Complete Guide with Protection Tips

Robert Grimmick

Robert Grimmick

Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.

Data Protection Guide: How To Secure Google Drive for Your Business

David Harrington

David Harrington

Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.

Data Breach statistics in 2024

82 Must-Know Data Breach Statistics [updated 2024]

Rob Sobers

Rob Sobers

These data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.