Suspicious Packages

Infographic: Guide to Handling Suspicious Packages

On average, the United States Postal Service (USPS) handles over 493 million pieces of mail (letters and packages) per day. That number does not include the additional millions of packages per day handled by other shipping companies such as United Parcel Service or Fed-Ex. On an average day, all of this goes off without a […]

Atlanta, Georgia Skyline

Infographic: Cybersecurity Awareness and Our Nation’s Critical Infrastructure

Our nation’s critical infrastructure is ubiquitous and it impacts almost every aspect of our day to day lives. The 16 sectors of critical infrastructure that work in unison to provide us with food, electricity, health care, and communication networks (among other things) are so baked into our daily activities, they’re easy to take for granted. […]

Infographic: Combating Insider Security Threats

Discussions of cybersecurity (and physical security, for that matter) tend to focus on hardening networks and end points against outside threats. Too often, businesses overlook the internal threats they face. This infographic from Teramind, a cybersecurity company that focuses on insider threat detection, provides key steps to help prevent internal harm to your infrastructure.

Closeup image of many people hands holding a jigsaw puzzle in circle together

Infographic: Cybersecurity in the Workplace is a Team Effort

Smart cybersecurity practices are more important now, as the lines between our public/private and work/home lives continue to blur. Therefore, it’s increasingly aware about your cyberhygiene, as you’re more likely to carry your bad habits (or good cybersecurity practices) as you transition from role to role. So, no matter where you work – whether it’s at […]

Young woman at a job interview.

Infographic: Rewarding Jobs in Cybersecurity

We’re right in the middle of National Cybersecurity Awareness Month, and the good folks at the National Cybersecurity Alliance would like to remind you that there are too few cybersecurity professionals in the workplace. This infographic provides a ton of useful information about the state of the workforce and outlines the broad array of opportunities […]

Computer hacker

Infographic: Are You At Risk of Digital Extortion?

The modern, connected world has made a number of crimes easier to commit. Of these, extortion might have gotten the biggest boost. We’ve certainly seen the explosion in ransomware attacks over the last couple of years. While ransomware might be the exemplar of an extortion attack, any time a cybercriminal tries to get you or […]

Parent and child using tablet

Infographic: October is National Cybersecurity Awareness Month!

Today, October 1, is the start of the 15th year of National Cybersecurity Awareness Month, a time when the Department of Homeland Security and the National Cyber Security Alliance work to bring awareness to the ever present issues regarding online safety. This year kicks off with a familiar, but very important theme: Making Your Home […]

Diverse business group having a meeting in boardroom

Infographic: Do You Have the Skills of a Fortune 100 CISO?

As your organization’s dependence on technology grows, the role of the Chief Information Security Officer (CISO) is more important than ever. What does it take to work at the executive-level in cybersecurity? Varonis analyzed data from the CISOs of Fortune 100 companies to get a better sense of what skills these leaders possessed.

Interested curious corporate spy looking at colleagues laptop, spying on rival, cheating on examination, stealing idea, sneaking peek, taking inquisitive glance at computer screen of unaware coworker

Infographic: The Multi-Faceted Approach to Penetration Testing

Hackers wear all varieties of hats. The best known are black hat hackers, who are out to sow cyber-discord in search of profit; and white hat hackers, who look for and report network vulnerabilities before malicious actors can find them. But what about red hat hackers? They are the professionals who specialize in penetration testing, […]

Closeup image of many people hands holding a jigsaw puzzle in circle together

Infographic: Incorporating DevOps to Create Scalable, Compliant Products

With ever increasing pressures from data protection laws such as the EU’s General Data Protection Regulation (GDPR), the looming California Consumer Privacy Act (CCPA), and the data breach laws active in all 50 states, businesses need to focus on baking security into their product design. To do this, many are turning to  DevOps as a […]