Blog

Data Security

What is Open XDR? Benefits and Security Comparisons

Josue Ledesma

Josue Ledesma

Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

What is Traceroute? How It Works and How to Read Results

Robert Grimmick

Robert Grimmick

Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Robert Grimmick

Robert Grimmick

Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

Evil Twin Attack: What it is, How to Detect & Prevent it

Josue Ledesma

Josue Ledesma

The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.

What is Cyber Espionage? Complete Guide with Protection Tips

Robert Grimmick

Robert Grimmick

Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.

Data Protection Guide: How To Secure Google Drive for Your Business

David Harrington

David Harrington

Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.

Data Breach statistics in 2024

82 Must-Know Data Breach Statistics [updated 2024]

Rob Sobers

Rob Sobers

These data breach statistics cover risk, cost, prevention and more — assess and analyze these stats to help prevent a data security incident.

How to Use Volatility for Memory Forensics and Analysis

Neil Fox

Neil Fox

This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.

Two certifications shown on an aquamarine gradient background: One for CCSP and one for CISSP.

CCSP vs. CISSP: Which One Should You Take?

Josue Ledesma

Josue Ledesma

Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.

NIST Cybersecurity Framework 2.0 with Varonis

Unpacking NIST Cybersecurity Framework 2.0

Shawn Hays

Shawn Hays

Learn how you can implement the NIST Cybersecurity Framework (CSF) 2.0 within your own organization and how Varonis helps.

Your Guide to Simulated Cyberattacks: What is Penetration Testing?

David Harrington

David Harrington

Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.

What is Terraform: Everything You Need to Know

David Harrington

David Harrington

Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.