Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data

In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control...

Read More

How to Do Data Classification at Scale

One of the important points we make in our recently published Information Entr opy report is that you can’t just decide you have intellectual property, issue NDAs to employees, and...

Read More

8 Things to Look for in File Auditing Software

Any seasoned IT pro will tell you: auditing file and email activity is hard.  You’ve got a production Exchange or SharePoint server being pounded on relentlessly by users all day...

Read More

What is Human Generated Data?

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

Read More

Real-time Alerting and Monitoring with Varonis DatAlert

Today we’re happy to announce Varonis Data Governance Suite 5.9 beta, which includes the launch of Varonis DatAlert.  DatAlert improves your ability to detect possible security breaches, misconfigurations, and other...

Read More

New PII Discovered: License Plate Pictures

After finishing up some research on personally identifiable information I thought, mistakenly, that I was familiar with the most exotic forms of PII uncovered in recent years, including zip code-birth...

Read More

What is HIPAA and why should I care?

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996, which requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health...

Read More

Red Alert: A Data Breach Report

Can you detect a data breach in real-time?  Most people can’t. Our new Red Alert Research Report, based on survey data from 248 information security professionals, indicates that only 6%...

Read More

The Dangers of Shared Links

Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs.  These URLs, often called “external links” or “shared links,” are a...

Read More

Personally Identifiable Information Hides in Dark Data

To my mind, HIPAA has the most sophisticated view of PII of all the US laws on the books. Their working definition encompasses vanilla identifiers: social security and credit card...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.