Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Insider Threats: Stealthy Hacking With WMI (Windows Management Instrumentation)

In looking at Windows features and tools from the perspective of a pen tester, it’s easy to lose sight that Microsoft’s operating system is really, wait for it, impressive. I...

Read More

Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips

Microsoft is pushing Teams- part of Office 365 – hard, and they report adoption rates that outpace Slack. You might not realize that Teams lives on top of SharePoint Online,...

Read More

What is ISO 27001 Compliance? Essential Tips and Insights

The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. In today’s world, with so many industries now reliant upon the...

Read More

Artificial Intelligence vs. Machine Learning in Cybersecurity

What’s the first thing you think of when you hear “artificial intelligence,” “machine learning” or “deep learning”? If you’re thinking about sentient robots that overtake cities or super cyborgs that...

Read More

How to Use Wireshark: Comprehensive Tutorial + Tips

If you find yourself troubleshooting network issues, and you have to inspect individual packets, you need to use Wireshark. Wireshark is the de facto, go-to, you-need-to-know-how-to-use, application to capture and...

Read More

Insider Threats: Stealthy Password Hacking With Smbexec   

As we’ve been writing about forever, hackers are relying more on malware-free techniques to fly below the radar. They’re using standard Windows software to live off the land, thereby getting...

Read More

52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security

In a world where news spreads fast and online reputation is everything, cyber-attacks and data breaches are a massive threat to organizations across the world. Data breaches are among the...

Read More

Frequently Asked Questions (FAQ): GDPR and HR/Employee Data

As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More

Data Security and Privacy Lessons From Recent GDPR Fines

We’re more than a year into the General Data Protection Regulation (GDPR) era, and we now have a few enforcement actions under our belts as data points. Earlier in 2019,...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.