Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

What is Data Classification? Guidelines and Process

Imagine you’re the CISO of a 10,000-person organization where users create millions of files and emails each day. Some of that information is highly sensitive—if leaked or stolen, you’re facing...

Read More

DNS Security Guide

DNS security should be considered an essential part of any business’s security plan. Name resolution services (translating hostnames into IP addresses) are used by nearly all applications and services on...

Read More

Active Directory Resource Center

Active Directory is the foundation for a majority of enterprise networks, and cybersecurity professionals need to have a solid understanding of it to protect and secure sensitive data. Most any...

Read More

What is DNS TTL + Best Practices

DNS TTL (time to live) is a setting that tells the DNS resolver how long to cache a query before requesting a new one. The information gathered is then stored...

Read More

Cloud Migration Strategy Guide: 7 Best Practices

If you are reading this guide, you are probably planning a data migration from on-premises data storage to a cloud-based platform like Microsoft Office 365, Google Drive (G Suite), or...

Read More

Introducing the Varonis Remote Work Update

The Varonis Data Security Platform Remote Work Update is here! This update delivers the product enhancements you need right now to keep your data safe in a work-from-home world. In...

Read More

24 Essential Penetration Testing Tools

Penetration testing has become an essential part of the security verification process. While it’s great that there are many penetration testing tools to choose from, with so many that perform...

Read More

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Ensuring that your Azure cloud service is compliant with the regulations that cover customer data can be complex. Each set of regulations – HIPAA, PCI, GDPR, and the CCPA –...

Read More

COVID-19 Threat Update #6

Hoarding isn’t just happening with toilet paper: we’re seeing cases where remote employees have downloaded department-level folders. Chances are, these files will contain sensitive data like PII, PCI, HIPAA and...

Read More

Is Microsoft Office 365 HIPAA Compliant?

No. That’s the answer in their FAQ. Out-of-the-box Office 365 is not HIPAA compliant, and you need to take the appropriate steps to ensure your organization stays compliant. As the...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.