Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is everything, cyber-attacks and data breaches are a massive threat to organizations across the world. Data breaches are among the...

Read More

Frequently Asked Questions (FAQ): GDPR and HR/Employee Data

As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More

Data Security and Privacy Lessons From Recent GDPR Fines

We’re more than a year into the General Data Protection Regulation (GDPR) era, and we now have a few enforcement actions under our belts as data points. Earlier in 2019,...

Read More

What is Metasploit? The Beginner’s Guide

Penetration testing allows you to answer the question, “How can someone with malicious intent mess with my network?” Using pen-testing tools, white hats and DevSec professionals are able to probe...

Read More

How to Use John the Ripper: Tips and Tutorials

John the Ripper (JtR) is one of the hacking tools the Varonis IR Team used in the first Live Cyber Attack demo, and one of the most popular password cracking...

Read More

11 Popular Programming Languages to Open Doors

Learning programming languages can open doors to new opportunities. But with so many languages out there, it’s imperative to pick the appropriate ones to best suit your career, personal goals...

Read More

NYS SHIELD Act: Updates to PII, Data Security, and Breach Notification  

After the devastating Equifax incident, the New York State legislature introduced the Stop Hacks and Improve Electronic Data Security or SHIELD Act in order to update the  existing  breach rules....

Read More

Azure Active Directory: Best Practices and Tutorials

Are you one of the 90% of organizations that Gartner predicts will move to hybrid cloud infrastructure by 2020? Most of that 90% will use Microsoft Azure Active Directory for...

Read More

Capital One’s Cloud Breach & Why Data-Centric Security Matters

Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.