Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

What is Endpoint Security? A Complete Guide

Endpoint security is the discipline of locking down any element of an organization that is capable of obtaining internal access to resources such as databases or servers. It is a...

Read More

Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget

National Cybersecurity Awareness Month comes around every October, but you shouldn’t rely on one month being enough to drive home the importance of cybersecurity to your employees. You should promote...

Read More

California Consumer Privacy Act (CCPA) Compliance Guide

The California Consumer Privacy Act (CCPA) is “the first consumer privacy act in the country,” as one California legislator put it.  No other US state has provided its citizens with  GDPR-like...

Read More

Insider Threats: Hard Lessons From WMI Eventing and Surveillance

Last time, we explored how a hypothetical insider could use the Windows Management Interface (WMI) and its eventing system to surveil other employees. No, I’m not the first person to...

Read More

How Hackers Use OSINT to Find Business Data

Hackers do their homework when picking a target, often relying on information left publically exposed to make decisions about how to attack. Whether an OSINT researcher is a hacker looking...

Read More

What is an Insider Threat? Definition and Examples

An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They...

Read More

What is a Security Operations Center (SOC)?

A SOC is an outsourced office that is completely dedicated to analyzing traffic flow and monitoring for threats and attacks. In today’s world of cyberattacks and data breaches, companies of...

Read More

A Practical Software Approach to Insider Threats

Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But...

Read More

What is a DDoS Attack? Identifying Denial-of-Service Attacks

A Distributed Denial of Service (DDoS) attack is an attempt to crash a web server or online system by overwhelming it with data. DDoS attacks can be simple mischief, revenge,...

Read More

How to Use Netcat Commands: Examples and Cheat Sheets

The Netcat utility program supports a wide range of commands to manage networks and monitor the flow of traffic data between systems. Computer networks, including the world wide web, are...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.