The Holiday Season is Prime Time for Credit Card Fraud

Be careful while using your credit cards this season. According to PNC Bank, credit card fraud increases about 19% during the holiday season. Most of us tend to use our credit cards more than usual and since we are in such a rush, sometimes we aren’t as careful with whom and where we use them. […]

Continue Reading →

All I Want for the Fiscal Year End Holiday is an Optimized Security Group

In one of our recent posts, Rob Sobers talked a bit about the Varonis recommendations engine and how it compares with hunch.com’s similar technology. I’m currently in the throes of last minute holiday shopping, and one of the things I find myself grateful for is Amazon’s recommendations engine. By analyzing the behavior of its busy […]

Continue Reading →

Substantially Reducing Risk by Cleaning Up Access Permissions

The article, “The Art of Profiling Cyber Criminals” within Dark Reading on December 8th, 2011 provides a brief outline of the characteristics of a typical cyber criminal.  The article is of interest because of its detailed description of the malicious insider.  Of particular interest is the following quote: “Around 65 percent of malicious insiders have […]

Continue Reading →

Your Mailbox is Almost Full

This again. It happens a few times a year—an automated email telling me I’m going to have to make some decisions about my data. It’s not like it’s a small mailbox, either—as of this morning, I have filled up 9.3 GB out of my allotted 10 GB. Today I’ve been notified that I’m also out of space […]

Continue Reading →

How to Assess Your Current Risk Profile and Effectively Reduce Risk

In our December 2011 newsletter, we highlight recent research from Gartner, “Security and Risk Management Lessons, Courtesy of WikiLeaks,” (Gartner subscription required) that begins, “The wholesale release of sensitive diplomatic cables by WikiLeaks serves as a reminder to organizations of the need to evaluate the benefits and risks of broader data access; the need for […]

Continue Reading →

The Challenges of Metadata Collection

In my recent post, Improving Authorization with Metadata, we talked about what kinds of information we need in order to start cleaning up access control. This time I want to talk a little bit about how we’ll actually get that metadata and what it will take to use it to do anything useful. If you […]

Continue Reading →

Hunch has the “Taste Graph”, Varonis has the “Access Graph”

It was recently announced that eBay has acquired New York-based startup Hunch for a reported $80 million (a tad over the reserve price).  Hunch is a recommendation engine created by Caterina Fake of Flickr fame, and Chris Dixon, a prominent entrepreneur and angel investor. It’s pretty obvious how eBay intends to use Hunch: to provide […]

Continue Reading →