Blog / Data Security (2)
Data Security (2)

What Is Zero Trust? Architecture and Security Guide

Sep 09, 2022
Zero trust is a security model that protects against both malicious insiders and external attacks that have breached your perimeter.

What is Mimikatz? The Beginner's Guide

Aug 26, 2022
Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets.

How to Use Wireshark: Comprehensive Tutorial + Tips

Aug 19, 2022
Learn how to use Wireshark, a widely-used network packet and analysis tool. This tutorial has everything from downloading to filters to packets.

SecurityRWD - How Amazon S3 Object-Tagging Can Put Form Around Flat Storage

Jul 28, 2022
Your favorite Varonis team members Ryan O'Boyle and Kilian Englert will explain how unlike classic storage arrays or traditional file servers, S3 buckets are a linear, flat storage solution, offering data object-tagging to create a sense of hierarchy.

What Is SQL Injection? Identification & Prevention Tips

Jul 22, 2022
SQL injection is a serious open web application security project (OWASP) vulnerability. Learn more about how to combat injection attacks in this article.

166 Cybersecurity Statistics and Trends [updated 2022]

Jul 08, 2022
These cybersecurity statistics for 2021 are grouped by category and include breaches, costs, crime type, compliance, industry-specific stats, job outlook.

Data Lifecycle Management (DLM): Everything You Need to Know

Jul 08, 2022
Data lifecycle management (DLM) is the process of managing data from creation to deletion. In this article, we’ll cover how DLM works and why you need it.

What is the CIA Triad?

Jul 08, 2022
Learn how the CIA triad can be used to classify, secure, and protect your data.

What Is Network Access Control? Explaining NAC Solutions

Jul 07, 2022
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.

86 Ransomware Statistics, Data, Trends, and Facts [updated 2022]

Jul 05, 2022
Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.

What is SSPM? Overview + Guide to SaaS Security Posture Management

Jul 01, 2022
SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.

IDS vs. IPS: What Organizations Need to Know

Jun 30, 2022
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.
No overhead. Just outcomes.