Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Microsoft Azure: Week of June 14th

Microsoft announced the renaming of Windows Virtual Desktop to Azure Virtual Desktop. This move is interesting as it drops the familiar Windows moniker for Azure branding. The article outlines the...

Read More

How to Create an Azure Virtual Network

Are you ready to move your data center to the cloud? You might be planning for things like identity, governance, and security, but one major topic is networking. How are...

Read More

Threat Update 42 – Hidden Costs of a Breach

The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage. Join Kilian and Kyle Roth from the Varonis...

Read More

Azure Automation using PowerShell Runbooks

Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...

Read More

Government Community Cloud: Primer on GCC High, GCC and DOD

Data security is paramount for federal agencies and contractors. This is especially true when it comes to doing business in the cloud. This is why many government teams utilize Government...

Read More

Last Week in Microsoft Azure: Week of June 7th

Azure announced the general availability of scale-out NVIDIA A100 GPU clusters. This addition gives Azure the fastest public cloud supercomputers on-demand in four Azure regions: East United States, West United...

Read More

Cybersecurity Threats Resource Center

Cybersecurity threats are constantly evolving and knowing how to protect and the latest threat facing your organization is an ongoing battle. Your security department should stay on top of any...

Read More

Threat Update 41 – Viewer Questions

At the end of each Threat Update episode, we invite the audience to ask questions or leave comments, so we took the opportunity to respond to a few. Join Kilian...

Read More

Process Hacker: Advanced Task Manager Overview

Process Hacker is a great tool for monitoring and investigating processes created by a piece of malware. It is a popular malware analysis tool amongst security professionals as it can...

Read More

Last Week in Microsoft Azure: Week of May 31st

Need to get caught up from all the Microsoft Build news? Check out the Book of News containing key items announced at Microsoft Build. Azure Vice President John Chirapurath shares...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.