Featured | Varonis Products | 4 min read Introducing Least Privilege Automation for Microsoft 365, Google Drive, and Box When excessive data access goes unchecked, one compromised user or rogue insider can inflict untold damage on your business. Reducing the data blast radius is the No. 1 challenge... By Yumna Moazzam
Data Security | July 5, 2022 86 Ransomware Statistics, Data, Trends, and Facts [updated 2022] By Rob Sobers
Data Security | July 1, 2022 What is SSPM? Overview + Guide to SaaS Security Posture Management By David Harrington
Privacy & Compliance | June 30, 2022 SOX Compliance Checklist & Audit Preparation Guide By David Harrington
Data Security | June 30, 2022 How a Doggo Can Teach You the Difference Between Salesforce Objects and Records By Kilian Englert
Data Security | June 30, 2022 DNS over HTTPS as a covert Command and Control channel By Masha Garmiza
Data Security | June 29, 2022 What is a Security Policy? Definition, Elements, and Examples By Robert Grimmick
Data Security | June 25, 2022 What is Traceroute? How It Works and How to Read Results By Robert Grimmick