What Do U.S. Security Legislation and Insurance Companies Have in Common?

Answer:  Both may affect the way businesses determine what constitute appropriate security measures. In February, Senators Joe Lieberman, Susan Collins, John D. Rockefeller IV, and Dianne Feinstein introduced the Cybersecurity Act of 2012. The intent of the Act is to give the Department of Homeland Security (DHS) additional power to set cyber security standards for…

5 Things You Should Know About Big Data

Big data is a very hot topic, and with the Splunk IPO last week seeing a 1999-style spike, the bandwagon is overflowing.  We’re poised to see many businesses pivoting into the big data space or simply slapping a big data sticker on their products—accurate or not—just to ride the wave. This post aims to help…

The State of Data Protection [INFOGRAPHIC]

In the age of big data, businesses are creating, processing, storing, and sharing information at an alarming rate.  A significant amount of the data is highly sensitive or confidential and should be properly safeguarded.  It’s unnerving to think about the possibility of our own personal information sitting on servers, possibly unencrypted and open to everyone….

New Case Study: Greenhill & Co.

Greenhill & Co., Inc. is a leading independent investment bank. The company was established in 1996 by Robert F. Greenhill, the former President of Morgan Stanley and former Chairman and Chief Executive Officer of Smith Barney. As the CIO of Greenhill & Co., Inc., John Shaffer sought a data governance solution that could provide visibility…

Data Governance Made Easier: Version 5.7 is now GA

Version 5.7 of the Varonis® Data Governance Suite® has been officially released. This version includes enhancements for Varonis DatAdvantage® and Varonis DataPrivilege® as well as a brand new product, DatAdvantage for Directory Services® . Almost all new features and enhancements came straight from our customers so we would like to say, thank you! Some of the new features and…

Another Great Trade Robbery

“The Great Trade Robbery” – currently used in the context of questionable international trading policies and lopsided sports team player trades—now has yet another meaning. Two recent articles about Digital Espionage and IP theft by the Chinese Government and Chinese businesses describe a new trade robbery that has apparently been going for some time, and the…

Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve…

Case Study: ATB Financial

With over 70 years of experience, ATB is the largest Alberta-based financial institution with more than 670,000 customers in 244 Alberta communities through a network of 164 branches. ATB needed an efficient way to audit data use on its Netapp filers, to identify stale and non-business related data for archival and removal, and to identify,…