Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

64% of Americans Don’t Know What to Do After a Data Breach — Do You? (Survey)

America’s literacy rate is 86% (which is not the best), but the data breach literacy is even worse. The majority of Americans don’t know what to do if they are...

Read More

10 Secure File Sharing Options, Tips and Solutions

It’s astounding to think about how much digital data is transmitted over the internet on a daily, hourly, or even minutely basis. Every time a web page is loaded or...

Read More

What the H**L Does Reasonable Data Security Really Mean?

For anyone who’s spent time looking at data security laws and regulations, you can’t help but come across the words “reasonable security”, or its close cousin “appropriate security”.  You can...

Read More

What is Data Loss Prevention (DLP)? Software and Solutions

Data Loss Prevention (DLP) software protects data from theft or loss that could cost your company in fines or productivity. DLP solutions cover a wide variety of techniques to protect...

Read More

What is Identity Access Management?

Identity and Access Management (IAM) is a core discipline for any information technology operational group. The first element is identity, which means verifying that a user is the person they...

Read More

What is Endpoint Security? A Complete Guide

Endpoint security is the discipline of locking down any element of an organization that is capable of obtaining internal access to resources such as databases or servers. It is a...

Read More

Cybersecurity Memo Templates and Awareness Flyers Employees Won’t Forget

National Cybersecurity Awareness Month comes around every October, but you shouldn’t rely on one month being enough to drive home the importance of cybersecurity to your employees. You should promote...

Read More

California Consumer Privacy Act (CCPA) Compliance Guide

The California Consumer Privacy Act (CCPA) is “the first consumer privacy act in the country,” as one California legislator put it.  No other US state has provided its citizens with  GDPR-like...

Read More

Insider Threats: Hard Lessons From WMI Eventing and Surveillance

Last time, we explored how a hypothetical insider could use the Windows Management Interface (WMI) and its eventing system to surveil other employees. No, I’m not the first person to...

Read More

How Hackers Use OSINT to Find Business Data

Hackers do their homework when picking a target, often relying on information left publically exposed to make decisions about how to attack. Whether an OSINT researcher is a hacker looking...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.