Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

SubInACL.exe Tool Overview, Use Cases and Permissions

SubInACL is a powerful command-line tool that is available in the Microsoft Windows 2000 Server Resource Kit and the Microsoft Windows NT Server 4.0 Resource Kit. SubInACL allows you to...

Read More

Varonis Recognized as a 2020 Gartner Peer Insights Customers’ Choice for File Analysis Software

Varonis received the Gartner Peer Insights Customers’ Choice distinction for the File Analysis Software market. We’re particularly proud of this recognition because it is 100% based on customer feedback. Thank...

Read More

What is a Man-in-the-Middle Attack: Detection and Prevention Tips

A man-in-the-middle (MitM) attack is a form of cyberattack where important data is intercepted by an attacker using a technique to interject themselves into the communication process. The attacker can...

Read More

Using PowerShell Try, Catch and Finally for Error Handling [Tutorial]

Errors are a natural part of writing code, unfortunately. How you handle them can make the difference between a script that stops elegantly and one that deletes large parts of...

Read More

A Guide to Group Policy and Why it Matters for Data Security

Group Policy is a feature of Microsoft Windows Active Directory that adds additional controls to user and computer accounts. Group policies provide centralized management and operating systems configurations of user’s...

Read More

Office 365 Admin Resource Center

Working as an administrator for Office 365 can be difficult. Though the Office 365 Admin Center has been built with usability in mind and will allow you to accomplish basic...

Read More

Risk Management Framework (RMF): An Overview

The Risk Management Framework (RMF) is a set of criteria that dictate how the United States government IT systems must be architected, secured, and monitored.  Originally developed by the Department...

Read More

What is Red Teaming? Methodology & Tools 

Red Teaming is the practice of testing the security of your systems by trying to hack them. A Red Team can be an externally contracted group of pen testers or...

Read More

Active Directory Account Lockout: Tools and Diagnosis Guide

Account lockouts are a headache for system administrators, and they happen a lot in Active Directory (AD). Research shows that account lockouts are the biggest single source of calls to...

Read More

What is Data Classification? Guidelines and Process

Imagine you’re the CISO of a 10,000-person organization where users create millions of files and emails each day. Some of that information is highly sensitive—if leaked or stolen, you’re facing...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.