Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Ransomware: Week of August 2nd

You may have trained employees about phishing emails but are they properly trained about phony call centers? According to the Microsoft security blog, the BazaCall campaign seems to be more...

Read More

Threat Update 49 – SeriousSAM & Black Hat 2021

Cybersecurity folks find themselves in a “Zero-Daze” as they get hit with another new 0-day attack, called SeriousSAM, that allows attackers to get access to the Windows Security Account Manager...

Read More

What is Threat Modeling and How To Choose the Right Framework

Threat modeling is a key responsibility for any cybersecurity team that is looking to protect their organization and their organization’s assets. It’s designed to help cybersecurity teams proactively find and...

Read More

Memory Forensics for Incident Response

When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform...

Read More

Last Week in Ransomware: Week of July 26th

In previous weeks we mentioned that the group behind the REvil ransomware attack has vanished from the internet, which makes it particularly surprising that a universal decryption key has been...

Read More

What is PSD2 Compliance and What Does it Mean for Your Business?

One of the newest regulations for payment services and processors is the European Union’s Payment Services Directive or PSD2. The PSD2 began taking effect in September of 2018 and is...

Read More

Threat Update 48 – Using Google to Spot Exposed Data in the Cloud

Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks. Configuration settings for these services can be complex –...

Read More

Last Week in Ransomware: Week of July 19th

This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and...

Read More

Threat Update 47 – Ransomware Early Warning: Data Exfiltration

Thought ransomware couldn’t get any worse? Ransomware gangs are now stealing victim’s data before unleashing ransomware – forcing victims to pay up or deal with the fallout when attackers post...

Read More

Data Migration Guide: Strategy Success & Best Practices

For most businesses, data migration is a necessary business process that takes place on a regular basis. Whether it’s implementing a new system or shifting information to more secure storage...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.