Varonis Debuts Trailblazing Features for Securing Salesforce

Learn More

✕
Skip navigation
  • Platform
    • Products
    • Overview
    • Data Protection
      • > DatAdvantageData audit & protection
      • > Automation EngineData remediation
      • > DataPrivilegeData access governance
      • > Data Transport EngineAutomated policy enforcement
    • Threat Detection & Response
      • > DatAlertData-centric UBA
      • > EdgePerimeter detections for DatAlert
      • > Varonis for Active DirectoryAnomaly detection & hardening
    • Privacy & Compliance
      • > Data Classification EngineSensitive data discovery
      • > Policy PackGDPR & CCPA discovery policies
      • > Federal Policy PackTop secret & CUI discovery policies
      • > Data Classification LabelsSensitive data labeling
      • > DatAnswersDSARs, e-Discovery, PII search
    • Cloud Security
      • > DatAdvantage CloudSaaS & IaaS Security
      • > Data Classification CloudSensitive data discovery
      • > Varonis for Microsoft 365Data-centric security for M365
      • > Varonis for SalesforceData-centric security for Salesforce
    • See all products
    •  
    • Learn more
    • How It Works
    • Integrations
    • Third-party Apps
    • Pricing
  • Solutions
    • By Industry
      • Finance
      • Healthcare
      • Federal Government
      • Education
      • Manufacturing
      • State & Local Government
    • By Use Case
      • Cloud Data Protection
      • Data Classification
      • Data Loss Prevention
      • Data Privacy & DSARs
      • Insider Risk Management
      • Ransomware Prevention
      • Zero Trust
    • By Technology
      • > Microsoft 365
      • > Windows File Shares
      • > Active Directory
      • > Google Drive
      • > Salesforce
      • > Nasuni
      • > UNIX/Linux
      • > Box
      • > Slack
      • > Okta
      • > GitHub
      • > NetApp
      See all integrations
  • Why Varonis?
    • Case Studies
    • Operational Plan
    • Industry Recognition
    • Customer Success
    • IR & Forensics Team
    • Measurable ROI
  • Company
    • About Varonis
    • Careers
    • Investor Relations
    • Press
    • Corporate Responsibility
    • Trust & Security
    • Brand
    • Contact Us
  • Partners
    • Partner Program
    • Partner Locator
    • Partner Portal
    • Service Providers
    • Technology Partners
  • Resources
    • Support
    • Resource Library
    • Blog
    • Free Security Courses
    • Product Training
    • SecurityFWD
    • Webinars
    • Events
  • Contact Us
    • Get support
    • +1 (877) 292-8767
  • Contact us
    • Get a demo
    • Get support
    • +1 (877) 292-8767

Inside Out Security

David Gibson

Inside Out Security / David Gibson

David Gibson

David Gibson has more than 20 years of technology and marketing experience. He frequently speaks about cybersecurity and technology best practices at industry conferences, and has been quoted in The New York Times, USA Today, The Washington Post and numerous security news sources.

Latest posts

Data Security |

March 29, 2020

DHS Emergency Directive 19-01: How to Detect DNS Attacks
David Gibson
By David Gibson
Data Security |

March 25, 2016

4 Step Guide to Managing Network Share Permissions
David Gibson
By David Gibson
Data Security |

February 13, 2015

How to Detect and Clean CryptoLocker Infections
David Gibson
By David Gibson
Data Security |

February 2, 2015

PCI DSS Explained: Our New White Paper Decodes the Complexity
David Gibson
By David Gibson
Data Security |

December 23, 2013

Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data
David Gibson
By David Gibson
Data Security |

March 29, 2012

Fixing the Open Shares Problem
David Gibson
By David Gibson
Data Security |

November 3, 2011

Open Shares
David Gibson
By David Gibson
Data Security |

October 25, 2011

Share Permissions
David Gibson
By David Gibson
Data Security |

August 20, 2011

What About Individual Users on ACL's?
David Gibson
By David Gibson
  • Legal
  • |
  • Trust
  • Legal
  • |
  • Trust
© 2022
Varonis