Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

What is an IT Security Audit? The Basics

A security audit is the high-level description of the many ways organizations can test and assess their overall security posture, including cybersecurity. You might employ more than one type of...

Read More

How to Use Microsoft Teams Safely: Security and Compliance Basics

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

Data Privacy Guide: Definitions, Explanations and Legislation

Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns...

Read More

What is UEBA? Complete Guide to User and Entity Behavior Analytics

UEBA can either stand for “User and Event Behavior Analytics” or “User and Entity Behavior Analytics.” It extends on an early type of cybersecurity practice – User Behavior Analytics, or...

Read More

Data Governance Framework Best Practices, Definitions and Examples

It’s 2020, do you know where your data is?  If you answered yes to that rhetorical question, you have a decent grasp of data governance. If not, it’s time to...

Read More

What is CDM and How Does Varonis Help?

The Continuous Diagnostics and Mitigation (CDM) program is a United States government cybersecurity initiative led by the Department of Homeland Security (DHS). The Cybersecurity and Infrastructure Security Agency (CISA) leads...

Read More

What is PGP Encryption and How Does It Work?

Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto...

Read More

How to Use Nmap: Commands and Tutorial Guide

Nmap is a network mapper that has emerged as one of the most popular, free network discovery tools on the market. Nmap is now one of the core tools used...

Read More

What is DNS Cache Poisoning? (Aka DNS Spoofing)

DNS cache poisoning is a cyber attack that tricks your computer into thinking it’s going to the correct address, but it’s not. Attackers use DNS cache poisoning to hijack internet...

Read More

What Is Network Access Control? Solutions and Explanations

Given how complex the topic of cybersecurity is in today’s high-tech world, many organizations feel the need to tackle it from various angles. They procure an antivirus solution from one...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.