Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update #16 – O365 & Business Email Compromise

How can companies tell the difference between legitimate email activity from malicious activity if they suspect someone is inappropriately accessing a user’s email? Click to watch Kilian Englert and Ryan...

Read More

How to Connect to Office 365 PowerShell: Azure AD Modules

This post will cover how to connect PowerShell to Office 365 (Azure Active Directory (Azure AD)), which manages Microsoft 365 tenant identities and licenses. I will also cover connecting to...

Read More

November 2020 Malware Trends Report

This Malware Trends Report – November 2020 is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples....

Read More

Threat Update #15 – Thanksgiving Special Edition

This week, Kilian Englert and Ryan O’Boyle take a break from their usual Threat Update discussions to ham it up and discuss some personal “threats” they face this Thanksgiving. We...

Read More

Last Week in Microsoft Teams: Week of November 23rd

The Microsoft Teams blog released several posts this week highlighting new app and workflow integrations as well as how to protect your data: Automating everyday tasks is even easier with...

Read More

Threat Update #14 – Post-Ransomware Recovery

To stop ransomware, every second counts. But once the threat is contained, the race is on to get back up and running after a ransomware incident. Click to watch Kilian Englert...

Read More

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) is a security paradigm whereby users are granted access to resources based on their role in the company. RBAC, if implemented correctly, can be an effective...

Read More

Watch: Varonis ReConnect! Defending Against Today’s Spookiest Malware

Mummy Spider, Gh0st Rat, Gothic Panda — if you’re interested in learning how threat actors get their names, how they operate and what you can do to protect your company,...

Read More

Netwalker Ransomware Guide: Everything You Need to Know

Emotet, Trickbot, Maze, Ryuk, and now Netwalker ransomware— cybercrime has increased exponentially in the last year. Ransomware has been a serious plight across industries big and small, public and private,...

Read More

Last Week in Microsoft Teams: Week of November 16th

The Microsoft Education blog posted a fantastic how-to on organizing school and class information with Microsoft Lists. You can add lists to Microsoft Teams channels for all kinds of collaboration...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.