
Josue Ledesma
Josue Ledesma is a writer, filmmaker, and content marketer living in New York City. He covers information security, tech and finance, consumer privacy, and B2B digital marketing. You can see his writing portfolio on https://josueledesma.com/Writing-Portfolio
-
Data Security
Jul 08, 2022
What is the CIA Triad?
Learn how the CIA triad can be used to classify, secure, and protect your data.
Josue Ledesma
5 min read
-
Data Security
Jun 30, 2022
IDS vs. IPS: What Organizations Need to Know
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
Josue Ledesma
5 min read
-
Data Security
Jun 24, 2022
Evil Twin Attack: What it is, How to Detect & Prevent it
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
Josue Ledesma
5 min read
-
Federal Privacy & Compliance
Jun 03, 2022
NIST 800-53: Definition and Tips for Compliance
Learn best practices for adopting and implementing the NIST 800-53 framework, a compliance standard for federal agencies and partners.
Josue Ledesma
4 min read
-
Data Security
Apr 07, 2022
CCSP vs. CISSP: Which One Should You Take?
Get an overview of the CCSP and CISSP exams and learn which certification is best for you and your career.
Josue Ledesma
5 min read
-
Data Security
Mar 18, 2022
What Is a Botnet? Definition and Prevention
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
Josue Ledesma
4 min read
-
Data Security
Oct 12, 2021
gMSA Guide: Group Managed Service Account Security & Deployment
Learn about Group Managed Service Accounts (gMSAs), a type of managed service account, and how you can secure your on-premise devices.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
Josue Ledesma
5 min read
-
Data Security
Aug 04, 2021
What is Threat Modeling and How To Choose the Right Framework
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
Josue Ledesma
5 min read
-
Data Security
Jun 07, 2021
Cybersecurity Threats Resource Center
Learn the cybersecurity threats facing your organization today and find out what tools, processes, and systems can help protect you from them.
Josue Ledesma
6 min read
-
Data Security
May 25, 2021
What is Privileged Access Management (PAM) and Why It’s Important to Your Organization
Learn why privileged access management is a necessary component of your cybersecurity strategy that keeps your assets protected.
Josue Ledesma
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital