Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

DNS Security Guide

DNS security should be considered an essential part of any business’s security plan. Name resolution services (translating hostnames into IP addresses) are used by nearly all applications and services on...

Read More

Active Directory Resource Center

Active Directory is the foundation for a majority of enterprise networks, and cybersecurity professionals need to have a solid understanding of it to protect and secure sensitive data. Most any...

Read More

PowerShell ForEach: Loop and Object Basics

PowerShell is a ubiquitous tool for system administrators and can be used to automate many common tasks across your Windows environment. Like most other programming languages, PowerShell makes use of...

Read More

What is DNS TTL + Best Practices

DNS TTL (time to live) is a setting that tells the DNS resolver how long to cache a query before requesting a new one. The information gathered is then stored...

Read More

Cloud Migration Strategy Guide: 7 Best Practices

If you are reading this guide, you are probably planning a data migration from on-premises data storage to a cloud-based platform like Microsoft Office 365, Google Drive (G Suite), or...

Read More

SharePoint Online Security: Best Practices and Audit Tips

SharePoint Online is a powerful cloud-based service from Microsoft that allows your team to share Office 365 files and data. Many companies are now migrating from on-premises Office 365 installations...

Read More

PowerShell Resource Center

PowerShell is a shell scripting framework developed by Microsoft originally designed for the administration of Windows systems. It is a standard but powerful tool for systems administrators, because it allows...

Read More

Data Privacy Laws: Resource Center

Data privacy and compliance is a crucial subject for every company working with user data. Depending on your company, how you work with data, and who you collect data on,...

Read More

Cybersecurity Maturity Model Certification (CMMC): What You Need to Know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across DoD contractors. It is a new framework for ensuring that the more than 300,000 companies in...

Read More

Introducing the Varonis Remote Work Update

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.