Latest articles
![](https://info.varonis.com/hubfs/Blog_DataLeak_BlogHero_202209_FNL.png)
What Is a Data Leak? Definition and Prevention
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Sep 09, 2022
Learn why data leaks can be devastating for companies and how you can defend against them.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/cia-triad-1.png)
What is the CIA Triad?
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jul 08, 2022
Learn how the CIA triad can be used to classify, secure, and protect your data.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_IDSvsIPS_BlogHero_FNL.png)
IDS vs. IPS: What Organizations Need to Know
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 30, 2022
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_OpenXDR_BlogHero_202203_FNL.png)
What is Open XDR? Benefits and Security Comparisons
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/evil-twin-attacks-hero.png)
Evil Twin Attack: What it is, How to Detect & Prevent it
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
![A dark blue checklist titled NIST 800-53 COMPLIANT floats over a blue gradient background.](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Blog_NIST800-53_BlogHero_202203_FNL.png)
NIST 800-53: Definition and Tips for Compliance
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Jun 03, 2022
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
![Two certifications shown on an aquamarine gradient background: One for CCSP and one for CISSP.](https://info.varonis.com/hubfs/CCSP_vs_CISSP_BlogHero.png)
CCSP vs. CISSP: Which One Should You Take?
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Apr 07, 2022
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
![](https://info.varonis.com/hubfs/nist-framework-hero.png)
What is the NIST Cybersecurity Framework?
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Apr 06, 2022
Learn how you can implement the NIST cybersecurity framework within your own organization.
![](https://info.varonis.com/hubfs/botnet-illustration.png)
What Is a Botnet? Definition and Prevention
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Mar 18, 2022
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Imported_Blog_Media/APT-hero.png)
What is an APT?: Advanced Persistent Threat Overview
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Dec 08, 2021
Learn how APT threats are targeting more organizations and how to defend against this sophisticated attack.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Imported_Blog_Media/gmsa-hero.png)
gMSA Guide: Group Managed Service Account Security & Deployment
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Oct 12, 2021
Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/2FA-hero.png)
What is Two-Factor Authentication (2FA) and Why Should You Use It?
![Josue Ledesma](https://info.varonis.com/hubfs/josue-ledesma.jpg)
Aug 04, 2021
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
Try Varonis free.
Deploys in minutes.