Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 35 – Healthcare Data at Risk

COVID-19 provided fertile ground for attackers to sow confusion and take advantage of healthcare organizations on the front lines. From hospitals triaging patients around the clock to pharmaceutical companies developing...

Read More

Last Week in Microsoft Azure: Week of April 19th

Microsoft released new capabilities in the Azure Container Registry PowerShell module. You can now fully manage repositories, manifests, and tags with increased performance. Learn how to get started with Azure...

Read More

Employee Data Theft Definition, Examples and Prevention Tips

Not all attacks come from external threats. With frightening frequency, insider threats and employee data theft have hit organizations, stealing data, important IP, and putting the organization at risk. There...

Read More

Threat Update 34 – Isn’t the Internet Supposed to be Bombproof?

The FBI recently averted a potential attack on the AWS cloud – and in the process raised many questions about the stability and redundancy of “the cloud” and the technology...

Read More

Last Week in Microsoft Azure: Week of April 12th

Senior Program Manager Gaurav Chandwani announces general availability of Cloud Services, which is a new Azure Resource Manager (ARM)-based deployment model for Azure Cloud Services. Microsoft released a Static Web...

Read More

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...

Read More

How Varonis Limits Organization-Wide Exposure

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

Read More

Last Week in Microsoft Azure: Week of April 5th

On April 1, Microsoft Azure DNS experienced a service availability issue. This outage resulted in customers not being able to resolve domain names for services. Read more about the outage...

Read More

Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential

The world has never been more interconnected, with cloud and digital technology allowing companies to flourish and succeed globally. However, this interconnectedness comes with elevated risk  — partners, vendors, and...

Read More

Endpoint Detection and Response: All You Need to Know About EDR Security

Endpoints – the laptops, smartphones, and other devices we use on a daily basis – are a favorite target of attackers. They’re everywhere, prone to security vulnerabilities, and difficult to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.