Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 48 – Using Google to Spot Exposed Data in the Cloud

Cloud data stores like Box and Google Workspace make sharing and collaborating easy and convenient. However, there can be hidden risks. Configuration settings for these services can be complex –...

Read More

Last Week in Ransomware: Week of July 19th

This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and...

Read More

Threat Update 47 – Ransomware Early Warning: Data Exfiltration

Thought ransomware couldn’t get any worse? Ransomware gangs are now stealing victim’s data before unleashing ransomware – forcing victims to pay up or deal with the fallout when attackers post...

Read More

Data Migration Guide: Strategy Success & Best Practices

For most businesses, data migration is a necessary business process that takes place on a regular basis. Whether it’s implementing a new system or shifting information to more secure storage...

Read More

Last Week in Ransomware: Week of July 12th

Over the past week, more information has come to light on the REvil ransomware attack. It seems that the attack what’s launched prematurely as the attackers discovered that a patch...

Read More

Threat Update 46 – Ransomware Early Warning: Data Discovery

Breaking News: The REvil ransomware gang launched an attack over the U.S. long holiday weekend. Varonis presented a webinar on the attack and you can check out this detailed breakdown...

Read More

Everything You Need to Know About Cyber Liability Insurance

Cyber insurance is a necessary component of any IT or cybersecurity department responsible for protecting the assets, data, reputation, and bottom line of a company in the face of cybersecurity...

Read More

How to Set Up AWS IAM: Elements, Features, & Components

Amazon Web Services (AWS) offers IT infrastructure services (IaaS-Infrastructure as a Service) to businesses in the form of web services commonly known as cloud computing. AWS provides a highly reliable,...

Read More

Last Week in Microsoft Azure: Week of July 5th

Rohan Kumar announces the upcoming release of Azure Arc-enabled data services. Incorporating Azure Arc and Azure SQL enables customers to deploy and run Azure SQL on any infrastructure, including on-premises...

Read More

Last Week in Ransomware: Week of July 5th

Ransomware in the News Before we get to the major ransomware attack that occurred over the holiday weekend, let’s take a look at some of the other stories from the...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.