Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 28 – Re-Ryuk’ed & Exchange Zero-Day

Is it too soon for a 2020 throwback? The Ryuk ransomware gang certainly doesn’t think so! It looks like one of the premiere ransomware-as-a-service groups was not content to rest...

Read More

Threat Update – Mass Exploitation of On-Prem Exchange Servers

On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...

Read More

Last Week in Microsoft Teams: Week of March 1st

This week Microsoft is hosting the Spring Microsoft Ignite 2021 conference. The Microsoft Teams blog provided a guide for everything Microsoft Teams at this free virtual event. Microsoft announced the...

Read More

Attack lab: Spear Phishing with Google Drive Sharing

Phishing scams are as old as the internet—tricking victims into divulging important information about themselves and their accounts. These scams are so common that all of the major email providers...

Read More

Threat Update 27 – Concentrations of Power

Why are there certain account types that are often targeted by attackers? Why can it be really difficult to detect certain types of account misuse? What are some of the...

Read More

Varonis Veterans Spotlight: Georgi Georgiev

Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...

Read More

Last Week in Microsoft Teams: Week of February 22nd

Corporate Vice President Jeff Teper posts about the vision behind the Viva announcement. Microsoft designed Viva to keep remote employees engaged and ensure they prioritize learning and career growth. The...

Read More

ReConnect – Version 8.5 and Combating Insider Risks in Microsoft 365

How do you visualize, measure, and reduce internal data exposure in Microsoft 365? What about detecting advanced threats like the SolarWinds attack? Kilian and Brian walk through the TL;DR version...

Read More

Your Primer to Third-Party Risk Management

Third-party risk management is an essential part of a company’s cybersecurity strategy but one that doesn’t often get the attention (or resources) it needs. But if it’s ignored, enterprises are...

Read More

Threat Update 26 – Living with Supply Chain Attacks

For years, security professionals have warned that you have to assume you’re breached, but the Solarwinds supply chain attack really brought this into focus for many organizations. Unfortunately, this is...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.