Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Microsoft Azure: Week of June 21st

Microsoft announced their newest sustainable datacenter region in Arizona, known as “West US 3.” Microsoft has a commitment to be carbon negative by 2030, and this new data center works...

Read More

Azure Bicep: Getting Started and How-To Guide

Are you deploying resources to Azure and trying to use Azure Resource Manager (ARM) templates? Are you finding the JSON syntax confusing? Microsoft heard the criticism and introduced a new...

Read More

Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX

Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims...

Read More

Last Week in Microsoft Azure: Week of June 14th

Microsoft announced the renaming of Windows Virtual Desktop to Azure Virtual Desktop. This move is interesting as it drops the familiar Windows moniker for Azure branding. The article outlines the...

Read More

How to Create an Azure Virtual Network

Are you ready to move your data center to the cloud? You might be planning for things like identity, governance, and security, but one major topic is networking. How are...

Read More

Threat Update 42 – Hidden Costs of a Breach

The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage. Join Kilian and Kyle Roth from the Varonis...

Read More

Azure Automation using PowerShell Runbooks

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Read More

Government Community Cloud: Primer on GCC High, GCC and DOD

Data security is paramount for federal agencies and contractors. This is especially true when it comes to doing business in the cloud. This is why many government teams utilize Government...

Read More

Last Week in Microsoft Azure: Week of June 7th

Azure announced the general availability of scale-out NVIDIA A100 GPU clusters. This addition gives Azure the fastest public cloud supercomputers on-demand in four Azure regions: East United States, West United...

Read More

Cybersecurity Threats Resource Center

Cybersecurity threats are constantly evolving and knowing how to protect and the latest threat facing your organization is an ongoing battle. Your security department should stay on top of any...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.