Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

The MITRE ATT&CK Framework: A Comprehensive Guide

The MITRE ATT&CK framework is a global knowledge base hub for documenting various tactics and techniques that hackers use throughout the different stages of a cyberattack. The MITRE company began...

Read More

Zero-Day Vulnerability Explained

There’s nothing hackers love more than picking low-hanging fruit in terms of systems weaknesses. And that’s exactly what a zero-day vulnerability attack does. A zero-day vulnerability is a software bug...

Read More

Threat Update 61 – When Work and Home SaaS Use Blurs, Expect the Unexpected

Businesses can face unexpected risk as the lines between corporate and personal SaaS apps begin to blur – especially as users introduce sensitive or regulated content into a corporate SaaS...

Read More

Illinois Privacy Law Compliance: What You Need to Know

The state of Illinois has recently passed several key pieces of legislation designed to bolster the data privacy rights and protections of residents. Illinois privacy law seeks to achieve similar...

Read More

ReConnect – Tackling SaaS Security

CISOs face tough choices when it comes to balancing security while getting the most of their cloud solutions. Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team answer...

Read More

Good for Evil: DeepBlueMagic Ransomware Group Abuses Legit Encryption Tools

A group known as “DeepBlueMagic” is suspected of launching a ransomware attack against Hillel Yaffe Medical Center in Israel, violating a loose “code of conduct” that many ransomware groups operate...

Read More

Threat Update 60 – Abusing Public Salesforce APIs for Fun & Profit

APIs are designed to facilitate programmatic access for application integrations and data sharing, but simple access misconfigurations in critical solutions like Salesforce can allow attackers to inappropriately access sensitive contacts,...

Read More

Password Spraying: What to Do and Prevention Tips

When it comes to password hacking, most organizations are quite familiar with brute force attacks, where cybercriminals continually guess passwords via computer algorithms tens of thousands of times in seconds...

Read More

gMSA Guide: Group Managed Service Account Security & Deployment

In any organization, there are a number of automated tasks, applications, or devices running in the background of any device across a network. One of the best ways to manage...

Read More

INVEST in America Act: Billion-Dollar Funding for Cybersecurity

The INVEST in America Act, which Congress is seeking to pass, provides nearly two billion dollars in funding to enhance the nation’s cybersecurity. Who should care? State, local, and tribal...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.