Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Using Varonis: Involving Data Owners (Part I)

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) Almost every organization is...

Read More

Using Varonis: Who Owns What?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) All organizational data needs...

Read More

4 Secrets for Archiving Stale Data Efficiently

The mandate to every IT department these days seems to be: “do more with less.”  The basic economic concept of scarcity is hitting home for many IT teams, not only...

Read More

New Zealand’s Leaky Servers Highlight the Need for Information Governance

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers Earlier this week, Keith Ng blogged about a massive security hole in the New Zealand Ministry of...

Read More

The New Privacy Environment: European Union Leads the Way on Personal Data Protection

We all understand the risks in accidentally revealing a social security number. But are there other pieces of less identifying or even anonymous information that taken together act like a...

Read More

The Definitive Guide to Cryptographic Hash Functions (Part II)

Last time I talked about how cryptographic hash functions are used to scramble passwords.  I also stressed why it is extremely important to not be able to take a hash...

Read More

Lessons Learned from Mat Honan’s Epic Hacking

” Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.” If you haven’t read Gizmodo writer Mat Honan’s...

Read More

The Definitive Guide to Cryptographic Hash Functions (Part 1)

Give me any message and I will create a secret code to obscure it. Try it! Try another one. This is called hashing—a technique often used to secure passwords (among...

Read More

Marco Arment on Dropbox: Don’t use it for anything valuable

If you haven’t heard of Marco Arment–creator of Instapaper, co-founder of Tumblr, and Internet-famous software developer–go follow him on Twitter…now. Not only is Marco an amazingly successful entrepreneur, but his...

Read More

The Difference Between Everyone and Authenticated Users

In order to maintain proper access controls, it’s crucial to understand what every entity on an access control list (ACL) represents, including the implicit identities that are built into a...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.