Blog / Data Security
Data Security

What Is Network Access Control? Explaining NAC Solutions

Jul 07, 2022
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.

Ransomware Statistics, Data, Trends, and Facts [updated 2023]

Jul 05, 2022
Ransomware is one of the most common types of malware used in cyberattacks. Check out these comprehensive ransomware statistics, plus prevention tips.

What is SSPM? Overview + Guide to SaaS Security Posture Management

Jul 01, 2022
SaaS security posture management (SSPM) is an automated solution that helps bolster the protection of all SaaS applications used by organizations.

IDS vs. IPS: What Organizations Need to Know

Jun 30, 2022
We explore IDS vs. IPS and break down the differences between the two cybersecurity systems. Read on to evaluate using them in your network.

How a Doggo Can Teach You the Difference Between Salesforce Objects and Records

Jun 30, 2022
What can Fido teach you about Salesforce? Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team host a special, goodest boy guest to explain the difference between objects, fields, and records in the popular CRM.

DNS over HTTPS as a covert Command and Control channel

Jun 30, 2022
Learn how DNS over HTTPS (DoH) is being actively used as a Command and Control (C2) channel by threat actors.

What is Red Teaming? Methodology & Tools

Jun 29, 2022
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.

What is a Security Policy? Definition, Elements, and Examples

Jun 29, 2022
A security policy is a document that spells out principles and strategies for an organization to maintain the security of its information assets.

What is Open XDR? Benefits and Security Comparisons

Jun 29, 2022
Learn all about the new open XDR solution and whether it’s the right fit for your organization’s security needs.

What is Traceroute? How It Works and How to Read Results

Jun 25, 2022
Traceroute is a tool to trace the path of an IP packet as it traverses routers locally or globally. It is primarily used for diagnostic and troubleshooting purposes.

What is an Insider Threat? Definition and Examples

Jun 24, 2022
Insider threats are internal risks to cybersecurity and data — learn more about insider threats, indicators, and how to detect them and prevent breaches.

Evil Twin Attack: What it is, How to Detect & Prevent it

Jun 24, 2022
The evil twin attack takes advantage of public WiFi connections. Learn how to prevent it from reaching you and your devices.
No overhead. Just outcomes.