Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

SANS Top 20 Critical Controls to Know

The SANS Top 20 Critical Controls are well-respected guidelines that organizations follow to protect their networks and intellectual property from cyberattacks. SANS is a 30-year-old research and educational organization that...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More

COVID-19 THREAT UPDATE #4

Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...

Read More

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Windows Management Instrumentation (WMI) is a subsystem of PowerShell that gives admins access to powerful system monitoring tools. Though this system has been designed to allow for fast, efficient system...

Read More

Top 5 Remote Work Security Threats

Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security best practices often take a back seat to business continuity in strange times like...

Read More

COVID-19 Threat Update #3

If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...

Read More

What is Fileless Malware? PowerShell Exploited

Fileless malware most commonly uses PowerShell to execute attacks on your system without leaving any traces. This type of attack is also known as a zero-footprint attack and can be...

Read More

Sysmon Threat Analysis Guide

In my various pentesting experiments, I’ll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for...

Read More

COVID-19 Threat Update #2

The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices.  It only takes one compromised remote...

Read More

The No Hassle Guide to Event Query Language (EQL) for Threat Hunting

Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.