Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Microsoft Teams: Week of October 19th

Corporate Vice President Jared Spataro post a great Twitter thread on how the pandemic has impacted workplace well being. Findings include more workers experiencing burnout, a blurred work/life balance, and...

Read More

Varonis Threat Update #9

When ransomware strikes, minutes matter. But an attack may not always be what it seems. That’s because ransomware can serve as a clever – and effective – smokescreen designed to...

Read More

Last Week in Microsoft Teams: Week of October 12th

In Microsoft’s IT Showcase, they have a comprehensive set of resources on how to lead a successful transition from Skype for Business to Microsoft Teams. This includes upgrades, adoption, and...

Read More

Varonis Threat Update #8

Emotet and Ryuk attacks are coming fast and furious, and they’re highly damaging. We’re seeing a huge surge in ransomware worldwide as criminal groups amp up their efforts to grab...

Read More

Last Week in Microsoft Teams: Week of October 5th

Missed some sessions from this year’s Ignite conference? This Microsoft Docs article has links to all the Teams sessions presented at Ignite 2020. The Microsoft Teams blog released two new...

Read More

How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests

Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require...

Read More

How Varonis Helps Stop Emotet

Our incident response team is tracking an unprecedented number of Emotet malware infections. The number of active concurrent Emotet investigations is threefold our previous high-water mark. This post will cover...

Read More

Exploiting BGInfo to Infiltrate a Corporate Network

Executive Summary There is a remote code execution attack vector within BGInfo. A clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi). If...

Read More

Government Hacking Exploits, Examples and Prevention Tips

Government hacking exploits, unfortunately, pose a very real threat for organizations of all kinds, and those of us working in cybersecurity need to be aware of it. A decade ago,...

Read More

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) is a security paradigm whereby users are granted access to resources based on their role in the company. RBAC, if implemented correctly, can be an effective...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.