Richard Stiennon on Packet Capture

About a decade ago I was fortunate enough to take a course at SANS on using Snort and tcpdump, taught by Stephen Northcutt, Judy Novak, and Marty Roesch. It was hands-down one of the best courses of any kind that I have ever taken and I’d recommend it for anyone remotely interested in network security….

Troy Hunt’s Billabong Breach Post-Mortem and Positive Externalities

If anything positive has come out of all the recent security breaches, it’s that the prolific security bloggers who have been posting interesting and helpful tips, tricks, and best practices for years are starting to get some of the attention they deserve. Last week, Troy Hunt published an epic blog post recounting the Billabong breach…

Varonis Research – Free Reports on Information Security, Big Data, Cloud, and More

I’m pleased to announce new Varonis Research section on varonis.com. We’ve been doing a lot of original research lately and we wanted a single place where you could go to view and download all of our reports. Some topics we’ve covered thus far include data protection, big data, cloud adoption, and most recently BYOS. You…

Marco Arment on Dropbox: Don’t use it for anything valuable

If you haven’t heard of Marco Arment–creator of Instapaper, co-founder of Tumblr, and Internet-famous software developer–go follow him on Twitter…now. Not only is Marco an amazingly successful entrepreneur, but his blog (marco.org) and weekly podcast (Build and Analyze) are consistently packed with unique and thoughtful insights on technology and, on occasion, coffee. On episode 85…

80% of Organizations are Scared of Moving to the Cloud

New research from IDG and Varonis reveals that even though 70% of organizations would like to use cloud sync services, only 20% allow cloud file sync because of security concerns. What are they worried about? 51% are worried about correct access rights and authorization 39% are worried over authentication 26% are worried about data loss…

Top 5 Reasons Why Organizations Want a Dropbox Alternative

During a recent visit to Brazil, I encountered many customers and partners who faced a similar challenge – providing their clients with a safe, secure and genuinely easy way to share files and collaborate with data.  All faced a number of barriers and none were happy with the current offerings of cloud based file sharing solutions. …

Varonis Data Governance Awards Deadline Extended to July 24

We’ve received some excellent submissions so far, but we wanted to give companies wrapped up in the end-of-quarter blitz additional time to apply. Therefore, we’ve extended the application deadline to July 24, 2012. Remember, the awards are free to enter, and are open to all of our customers, regardless of size, location, business type or…

Does Data Security Require IT Tyranny in the BYOD Era?

The BYOD (Bring Your Own Device) and BYOS (Bring Your Own Software) movements within the enterprise have been somewhat of a revolution — workers want to be free from the (perceived) tyrannical reign of the IT department. It’s easy to see why this trend is occurring — would you rather use Lotus Notes or Gmail? Macbook Air or 10…

The Difference Between Everyone and Authenticated Users

In order to maintain proper access controls, it’s crucial to understand what every entity on an access control list (ACL) represents, including the implicit identities that are built into a Windows environment. There are a lot of built-in accounts with obscure names and vague descriptions, so it can be confusing. One question I often get…