Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 39 – Let Me Google That PII On You

Cloud collaboration tools like Google Drive are ubiquitous, but in our work from anywhere world, IT and security often face challenges understanding how and where personal accounts intermingle with corporate...

Read More

ReConnect – (h)Active Directory & Automation Engine

Most cyberattacks seem to have a number of common patterns like targeting Active Directory to get wider and deeper in an organization, with the ultimate goal of finding and stealing...

Read More

YARA Rules Guide: Learning this Malware Research Tool

YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns. In this article I will cover: How YARA...

Read More

Git Branching and Merging: A Step-By-Step Guide

In previous articles, you learned “How to Revert a Commit in Git” (a PowerShell Git tutorial) and “How to Merge in Git: Remote and Local Git Repositories Tutorial.” You can...

Read More

Last Week in Microsoft Azure: Week of May 17th

Microsoft announces the general availability of Azure Static Web Apps. Azure Static Web Apps hosting service enables consumers and businesses to establish a web presence to a global audience with...

Read More

Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS

Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and...

Read More

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More

How to Use Azure Sentinel for Security Analytics and Threat Intelligence

Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the...

Read More

Last Week in Microsoft Azure: Week of May 10th

Senior Product Marketing Manager Erin Zefkeles announces a fluent new look for the Azure icon. The Azure “A” icon is getting an updated look to represent the unity of Azure...

Read More

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.