Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Microsoft Teams: Week of January 18th

The Microsoft Teams blog released several articles this week: Approvals in Microsoft Teams, Now General Available: The Approvals app enables Teams users to create, manage, and share approvals directly within...

Read More

Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365

The transition to remote work over the last year has exponentially increased the usage of Microsoft 365’s collaboration tools. One look at the massive spike in daily active users for...

Read More

Threat Update 21 – SolarLeaks

The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...

Read More

Exfiltrate NTLM Hashes with PowerShell Profiles

The privilege escalation method shown in this article is a variant used by Russian-based espionage groups. It outlines an attacker’s ability to leverage built-in PowerShell features to execute arbitrary commands...

Read More

Threat Update 20 – Cyberthreat 2021

Anyone else excited that 2020 is over? In the spirit of looking to the future, join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...

Read More

Last Week in Microsoft Teams: Week of January 11th

Microsoft published their monthly What’s New in Microsoft Teams for December 2020. The recap includes summaries of virtual breakout rooms, new meeting pre-join experience, new device capabilities, and multiple number...

Read More

Threat Update 19 – Best Incident Response Investigations of 2020

Want to look back on 2020? Nah, neither do we… but 2020 did have a whole host of cyberthreats that posed new challenges to IT and InfoSec teams! Click to...

Read More

What Is Network Segmentation?

Simply put, network segmentation is the act of dividing a computer network into smaller physical or logical components. Two devices on the same network segment can talk to each other...

Read More

Threat Update 18 – Sanctions for Ransomware Payments

Would you consider coughing up the bitcoins if you got hit with ransomware? Better think again, you could potentially end up in more trouble! Click to watch Kilian Englert and...

Read More

The Complete Guide to Phishing Attacks

Phishing attacks have been a plight on individuals and organizations since the invention of email. As of late, these attacks have become more sophisticated and challenging to detect. Phishing attacks...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.