Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Robert Grimmick

Latest articles

What is IDOR (Insecure Direct Object Reference)?

Robert Grimmick

Robert Grimmick

Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.

What Is Network Access Control? Explaining NAC Solutions

Robert Grimmick

Robert Grimmick

Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.

What is a Security Policy? Definition, Elements, and Examples

Robert Grimmick

Robert Grimmick

A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.

What is Traceroute? How It Works and How to Read Results

Robert Grimmick

Robert Grimmick

Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Robert Grimmick

Robert Grimmick

Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

What is Cyber Espionage? Complete Guide with Protection Tips

Robert Grimmick

Robert Grimmick

Cyber espionage is the unauthorized use of computer networks to access privileged information. Read on to learn more about this growing worldwide problem.

A dark blue globe with a white checkmark floats above a gradient blue background.

ISO 27001 Compliance Guide: Essential Tips and Insights

Robert Grimmick

Robert Grimmick

Looking to earn ISO 27001 compliance? Learn about this widely known information security standard, what’s in it, and how to become certified in this post!

How to Fix Broken Registry Items: Visual Guide and Solutions

Robert Grimmick

Robert Grimmick

Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.

Packet Capture: What is it and What You Need to Know

Robert Grimmick

Robert Grimmick

Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.

SIEM Tools: 9 Tips for a Successful Deployment

Robert Grimmick

Robert Grimmick

Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Robert Grimmick

Robert Grimmick

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…

ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks

Robert Grimmick

Robert Grimmick

ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…

Prev

1 2

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.