Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

IT Pros

Articles

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is everything, cyber-attacks and data breaches are a massive threat to organizations across the world. Data breaches are among the...

Read More

Azure Active Directory: Best Practices and Tutorials

Are you one of the 90% of organizations that Gartner predicts will move to hybrid cloud infrastructure by 2020? Most of that 90% will use Microsoft Azure Active Directory for...

Read More

AWS vs Azure vs Google: Cloud Services Comparison

Doing business in a cloud is more than just a lovely way to pass the time. Cloud computing services make sense from both a strategic and performance angle. However, business...

Read More

Permission Propagation: Info and Tips

Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all...

Read More

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

Read More

Solving The Cybersecurity Skills Shortage Within Your Organization

It’s simple economics: supply and demand. A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses....

Read More

Understanding Security Analytics Platforms

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Read More

Which Cybersecurity Career Is Right For Me?

New high-profile cyber attacks seem to constantly flood news headlines, so it’s no wonder that cybersecurity experts are becoming such an important and in-demand position for all types of firms....

Read More

Varonis eBook: Cyber Risk Modeling for CISOs

Our  CISO Guide to Cybersecurity Risk ebook is the perfect read for busy IT executive who’ve yet to discover a shocking secret about CEOs and cybersecurity. What’s that secret you...

Read More

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.