Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 56 – SSO Imposter: Targeting Box

In the final part of the series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team walk through how attackers could target Box. They investigate how an attacker...

Read More

Google Workspace Data Protection Guide & Resources

Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and...

Read More

Threat Update 55 – SSO Imposter: Targeting Google

In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can...

Read More

Texas Privacy Act: Overview and Compliance Guide

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is...

Read More

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for...

Read More

Threat Update 54 – SSO Imposter: Intrusion

Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers...

Read More

Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!

Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication...

Read More

Securing Azure Blob Storage: Set-Up Guide

Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been...

Read More

Azure CLI Overview: Setup, Comparison, and Integration Tips

If you are just learning about Azure, most likely you are working in the Azure Portal. You have probably created resources like virtual machines and storage accounts by using the...

Read More

Introduction to AWS DevOps: Skills + Tools You Need

AWS provides a set of flexible services designed to enable organizations to build and deliver products faster and more reliably by implementing DevOps practices. These services simplify provisioning and managing...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.