Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
David Harrington

Latest articles

Data Protection Guide: How To Secure Google Drive for Your Business

David Harrington

David Harrington

Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.

What Is Data Governance? Framework and Best Practices

David Harrington

David Harrington

Data Governance helps organize, secure, and standardize data for all types of organizations. Learn more about data governance frameworks here.

A dark blue text volume labeled

NIST 800-171 Compliance Checklist and Terminology Reference

David Harrington

David Harrington

Government contractors who handle Controlled Unclassified Information (CUI) must be NIST 800-171 compliant. Use this checklist as a complete reference.

Your Guide to Simulated Cyberattacks: What is Penetration Testing?

David Harrington

David Harrington

Penetration testing simulates a real-world cyber-attack on your critical data and systems. Here’s what penetration testing is, the processes and tools behind it, and how pen testing helps spot vulnerabilities before hackers do.

What is Terraform: Everything You Need to Know

David Harrington

David Harrington

Terraform is an infrastructure-as-code (IaC) solution that helps DevOps teams manage multi-cloud deployments. Learn about what is Terraform, the benefits of IaC, and how to get started.

Ransomware-as-a-Service Explained: What is RaaS?

David Harrington

David Harrington

Ransomware as a service (RaaS) is an emerging and potent cybersecurity threat to all organizations. If you’re unaware of how RaaS works, your system is potentially at risk. What RaaS is and how to guard against it.

How to Monitor Network Traffic: Effective Steps & Tips

David Harrington

David Harrington

In this article, you will learn how to monitor network traffic using different tools and methods.

What is a Security Operations Center (SOC)?

David Harrington

David Harrington

What is SOC security? In this article we'll dive into the functions of an SOC and why it's critical for the safety of your company's security and response to cybersecurity incidents.

The MITRE ATT&CK Framework: A Comprehensive Guide

David Harrington

David Harrington

The MITRE ATT&CK framework helps businesses discover which hacker techniques, tactics, and behaviors they're most vulnerable to. Read about how to use ATT&CK for penetration testing within your organization today.

Illinois Privacy Law Compliance: What You Need to Know

David Harrington

David Harrington

The Illinois Personal Information Protection Act (PIPA) is designed to safeguard the personal data of Illinois residents. Learn what PIPA is, who it affects, and how to maintain compliance.

Password Spraying: What to Do and Prevention Tips

David Harrington

David Harrington

Using common or overly simplistic passwords can make users and organizations vulnerable to password spraying. Learn what password spraying attacks are, how they work, and what you can do to prevent one.

Microsoft LAPS Overview: Setup, Installation, and Security

David Harrington

David Harrington

Learn the basics of Microsoft LAPS to keep users from gaining unauthorized access to your system. Contact us for help with your data protection needs.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.