Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 66 – Not The “Cloud Solution” You Are Expecting

To celebrate Thanksgiving in the U.S., Kilian and Ryan discuss a solution that contains the closest thing they can find to actual tiny clouds, as well as additional elements necessary...

Read More

Threat Update 65 – What is Cloud Security Posture Management (CSPM)?

Organizations face big challenges selecting the right solutions when crafting a layered approach to cloud security – especially with the alphabet soup of options and acronyms out there. Kilian and...

Read More

How to Monitor Network Traffic: Effective Steps & Tips

No matter how communications and information technology evolves, data in motion will always exist. Hackers will always target the main arteries and thoroughfares of data flow, so monitoring network traffic...

Read More

No Time to REST: Check Your Jira Permissions for Leaks

Varonis researchers enumerated a list of 812 subdomains and found 689 accessible Jira instances. We found 3,774 public dashboards, 244 projects, and 75,629 issues containing email addresses, URLs, and IP...

Read More

What is a Security Operations Center (SOC)?

With cyberattacks and data breaches on the rise, companies of all sizes need to place an emphasis on securing their technology assets. However, assembling a full-time in-house IT security team...

Read More

Role-Based Access Control (RBAC)

Organizations of all sizes are worried about securing their IT investments and a key part of this is providing users limited access only to the resources that they need to...

Read More

Threat Update 64 – Escaping Einstein’s Wormhole

Salesforce’s Einstein Activity Capture (EAC) is a convenient, automated way to boost your sales team’s productivity by consolidating relevant customer emails, and meetings into a central system – Salesforce. However,...

Read More

Cloud Applications Put Your Data At Risk — Here’s How To Regain Control

Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they’re also a big, growing risk. Your data is in more places...

Read More

Threat Update 63 – Moving To The Cloud Doesn’t Mean You Don’t Own The Data Risk

Leveraging cloud solutions can alleviate some legacy infrastructure risks but can bring data protection challenges to the forefront. Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team discuss...

Read More

How to Install and Import Active Directory PowerShell Module

Are you tired of managing Active Directory using the graphical interface? Then you might be interested in the Active Directory PowerShell module! This module gives you the ability to manage...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.