Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

It’s Here! The 2019 Global Data Risk Report Reveals Every Employee has Access to 17 Million Files

If you could take the temperature of data security risk at more than 700 enterprises around the globe, what would you find? Every year, Varonis gives the world a behind-the-scenes...

Read More

CEO vs. CISO Mindsets, Part V: Hacking For CEOs

Can a single number, Value at Risk or VaR, summarize financial risk of cyber attacks? Of course not! I may have left the impression from the previous post in this...

Read More

56 Must Know Data Breach Statistics for 2019

Data breaches are getting bigger, hackers are getting savvier, and the amount of compromised data is unfortunately on the rise. A quick look at data breach trends shows that hackers...

Read More

Analyzing Company Reputation After a Data Breach

The period following a data breach is not an easy one for companies. Lots of time and money are spent to effectively manage a crisis, with even more time and...

Read More

Varonis Version 7 Highlights

Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new. 25 new widgets to manage and protect...

Read More

What is FISMA Compliance? Regulations and Requirements

FISMA stands for the Federal Information Security Management Act, which the United States Congress passed in 2002: it requires federal agencies to implement information security plans to protect sensitive data....

Read More

Active Directory Domain Controller (AD DC) Could Not Be Contacted [SOLVED]

When your users report that they see “an active directory domain controller for the domain could not be contacted” there could be a few different causes for this issue. Most...

Read More

We Need to Talk About Gramm-Leach-Bliley (GLB): The Safeguards Rule Will Be Changing!

As a blogger following data security laws and regulations, I’m occasionally rewarded with an “I told you this law would be important” moment.  Earlier this month with the news that...

Read More

Active Directory Users and Computers (ADUC): Installation and Uses

Active Directory Users and Computers (ADUC) is a Microsoft Management Console snap-in that you use to administer Active Directory (AD). You can manage objects (users, computers), Organizational Units (OU), and...

Read More

Data Breach Response Times: Trends and Tips

Companies are under pressure to keep data safe, plus act both swiftly and transparently in the event of a data breach. Slow responses to breaches result in fines from (sometimes...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.