Data Security
What is Open XDR? Benefits and Security Comparisons
Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
What is Traceroute? How It Works and How to Read Results
Jun 25, 2022
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.
What is an Insider Threat? Definition and Examples
Jun 24, 2022
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.
Evil Twin Attack: What it is, How to Detect & Prevent it
Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
What is Cyber Espionage? Complete Guide with Protection Tips
Jun 16, 2022
Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.
Data Protection Guide: How To Secure Google Drive for Your Business
Jun 15, 2022
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
82 Must-Know Data Breach Statistics [updated 2024]
May 20, 2022
These data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.
How to Use Volatility for Memory Forensics and Analysis
Apr 12, 2022
This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.
CCSP vs. CISSP: Which One Should You Take?
Apr 07, 2022
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
Unpacking NIST Cybersecurity Framework 2.0
Apr 06, 2022
Learn how you can implement the NIST Cybersecurity Framework (CSF) 2.0 within your own organization and how Varonis helps.
Your Guide to Simulated Cyberattacks: What is Penetration Testing?
Mar 31, 2022
Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.
What is Terraform: Everything You Need to Know
Mar 30, 2022
Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.
Try Varonis free.
Deploys in minutes.