Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Andy Green

We Know About Your Company’s Data: OSINT Lessons for C-Levels

 I’ve been on a mission the last few months to bring  basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Read More

The California Privacy Act (CCPA) Clones Are Coming: States Draft Copycat Laws

In 2018, the California Consumer Privacy Act (CCPA) was signed into law. Its goal is to extend consumer privacy protections to the internet. The CCPA was heavily influenced by the...

Read More

PowerShell for Pentesters: Scripts, Examples and Tips

In case you haven’t noticed, we’ve been championing PowerShell as a pentesting tool in more than a few blog posts. One big reason to learn PowerShell and use it to...

Read More

A Quick Dip into Event Query Language (EQL)

Did you ever have the urge to put together a few PowerShell scripts leveraging the Windows Management Interface (WMI) to create your own file security monitoring package? My advice: wait...

Read More

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

Read More

Understanding Security Analytics Platforms

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Read More

Varonis eBook: Cyber Risk Modeling for CISOs

Our  CISO Guide to Cybersecurity Risk ebook is the perfect read for busy IT executive who’ve yet to discover a shocking secret about CEOs and cybersecurity. What’s that secret you...

Read More

Practical Cyber Threat Cost Analysis: A Risk Model for Denial of Service Attacks

Risk analysis doesn’t get the attention it deserves. It’s the part of the risk assessment process where you feed all your important results  — where the credit cards numbers are...

Read More

Security Risk Analysis Is Different From Risk Assessment

At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....

Read More

Understanding the Relationship Between the GDPR and ePrivacy Directive

Remember last May when our favorite sites were suddenly asking our consent to collect cookie information? The answer given by the media and other experts for this flurry of cookie...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.