Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Threat Update 51 – LockBit and Insider Threats for Hire

Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue. It was only a matter of time before these two...

Read More

Threat Update 50 – Critical Salesforce Misconfiguration

Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed...

Read More

Think Your Data Is Secure? Three Questions You Need To Answer Right Now

As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve...

Read More

Abusing Misconfigured Salesforce Communities for Recon and Data Theft

A misconfigured Salesforce Community may lead to sensitive Salesforce data being exposed to anyone on the internet. Anonymous users can query objects that contain sensitive information such as customer lists,...

Read More

Understand and Implement Azure Monitor for Monitoring Workloads

You always want your business-critical production applications to run without issues or downtime. To achieve this you need to continuously analyze system logs, monitor your application and their dependent services...

Read More

Last Week in Ransomware: Week of August 9th

DarkSide and REvil might not be as done as we originally imagined, the new BlackMatter group has emerged claiming to be their successor. And it’s not all just words, they’ve...

Read More

Packet Capture: What is it and What You Need to Know

Packet capture is a vital tool used to keep networks operating safely and efficiently. In the wrong hands, it can also be used to steal sensitive data like usernames and...

Read More

What is Two-Factor Authentication (2FA) and Why Should You Use It?

Two-factor authentication (2FA)  is one of the most effective ways to reduce the risk of your employees falling victim to an account takeover, potentially exposing your organization’s sensitive assets and...

Read More

Your Comprehensive Guide to Salesforce Shield

For the seventh consecutive year, Salesforce maintains the lion’s share of the CRM ecosystem worldwide. Salesforce comprises 20% of all CRM instances worldwide used to manage and process customer data....

Read More

Last Week in Ransomware: Week of August 2nd

You may have trained employees about phishing emails but are they properly trained about phony call centers? According to the Microsoft security blog, the BazaCall campaign seems to be more...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.