Substantially Reducing Risk by Cleaning Up Access Permissions

The article, “The Art of Profiling Cyber Criminals” within Dark Reading on December 8th, 2011 provides a brief outline of the characteristics of a typical cyber criminal.  The article is of interest because of its detailed description of the malicious insider.  Of particular interest is the following quote: “Around 65 percent of malicious insiders have…

Your Mailbox is Almost Full

This again. It happens a few times a year—an automated email telling me I’m going to have to make some decisions about my data. It’s not like it’s a small mailbox, either—as of this morning, I have filled up 9.3 GB out of my allotted 10 GB. Today I’ve been notified that I’m also out of space…

Hunch has the “Taste Graph”, Varonis has the “Access Graph”

It was recently announced that eBay has acquired New York-based startup Hunch for a reported $80 million (a tad over the reserve price).  Hunch is a recommendation engine created by Caterina Fake of Flickr fame, and Chris Dixon, a prominent entrepreneur and angel investor. It’s pretty obvious how eBay intends to use Hunch: to provide…