Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Andy Green

Understanding Security Analytics Platforms

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Read More

Varonis eBook: Cyber Risk Modeling for CISOs

Our  CISO Guide to Cybersecurity Risk ebook is the perfect read for busy IT executive who’ve yet to discover a shocking secret about CEOs and cybersecurity. What’s that secret you...

Read More

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Read More

Security Risk Analysis Is Different From Risk Assessment

At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....

Read More

Understanding the Relationship Between the GDPR and ePrivacy Directive

Remember last May when our favorite sites were suddenly asking our consent to collect cookie information? The answer given by the media and other experts for this flurry of cookie...

Read More

What is Security Analytics? Guide for the Non-Analytical

Security analytics is the practice of analyzing raw security data to discover preemptive and actionable security measures to increase cybersecurity. It’s not necessarily a particular technique, but certainly involves aggregating...

Read More

CEO vs. CISO Mindsets, Part V: Hacking For CEOs

Can a single number, Value at Risk or VaR, summarize financial risk of cyber attacks? Of course not! I may have left the impression from the previous post in this...

Read More

We Need to Talk About Gramm-Leach-Bliley (GLB): The Safeguards Rule Will Be Changing!

As a blogger following data security laws and regulations, I’m occasionally rewarded with an “I told you this law would be important” moment.  Earlier this month with the news that...

Read More

Protect Your Data With Super Easy File Security Tricks!

Data security is an all-encompassing term. It covers processes and technologies for protecting files, databases, applications, user accounts, servers, network logins, and the network itself. But if you drill down...

Read More

CEO vs. CISO Mindsets, Part IV: Monte Carlo Breach Cost Modeling for CISOs!

My main goal in this series is to give CISOs insights into CEO and board-level decision making so they can make a winning case for potential data security purchases. In...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.