What IT Really Does

Unfortunately, not many people really understand all the amazing work that goes into systems administration, network engineering, technical support, computer security, and all of the other IT related disciplines. Businesses these days are extremely reliant on technology, and most people take for granted that they can show up at the office in the morning and…

Case Study: City of Buffalo

Located in western New York, Buffalo is the second most populous city in the state of New York (after New York City) with a population of 261,310, according to the 2010 census. Its municipal government provides network resources for the 8,000+ employees, encompassing various departments, from its emergency services including the Police and Fire Departments,…

Near-Field Authentication over Avian Carrier

I read about “chirp” the other day – a new iPhone app that lets you share pictures and links from your phone with an audible tone that sounds like—surprise—a bird chirp. Here’s how it works: You open up the chirp app on your iphone or ipad You select a hyperlink, a note, or a picture…

Vote Now on the Finalists for the 2012 Varonis Data Governance Awards

In May 2012, Varonis launched its first customer awards program – the Varonis Data Governance Awards. Entry has now closed, and we are delighted with the response we received and the outstanding strength of the different entries. We have reviewed the entries and selected our shortlist. The judging panel is made up of independent industry…

Social Engineering in the Enterprise

In light of Mat Honan’s harrowing story, where both Apple and Amazon fell victim to social engineering attacks attributable to profound weaknesses in their identity verification processes, the billion dollar question becomes: how vulnerable are your company’s internal processes to social engineering? Have you ever called the IT help desk for a password reset?  What…

Complete our Data Migration Survey for a chance to win a 13″ Macbook Air

You know the feeling – you get a brand new, shiny, screamingly fast NAS for your data center.  Everyone’s excited to plug it in.  Then reality hits.  Now you have to plan a migration.  Buzzkill. Every time I talk to a sysadmin or storage pro about what their biggest headache is, the answer is almost…

The Definitive Guide to Cryptographic Hash Functions (Part II)

Last time I talked about how cryptographic hash functions are used to scramble passwords.  I also stressed why it is extremely important to not be able to take a hash value and work backwards to figure out the plain text input.   That was Golden Rule #1 (pre-image resistance). But if hashes can’t be reversed, why…

My Grandmother Uses Dropbox — Why can’t I?

My first involvement with tech occurred in the early 80s. I recall the days of modems, time division multiplexors, acoustic couplers, and dipswitches.  Most people don’t realize it, but cloud based file sharing existed in the 80s, but required an account with a major X.25 “cloud” service provider, such as Tymnet or Telenet. At the…

Lessons Learned from Mat Honan’s Epic Hacking

“ Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.” If you haven’t read Gizmodo writer Mat Honan’s gut-wrenching play-by-play of how his entire digital life was evaporated in the matter of hours, do yourself a favor and Instapaper it. Or, if you’re…

The Definitive Guide to Cryptographic Hash Functions (Part 1)

Give me any message and I will create a secret code to obscure it. Try it! Try another one. This is called hashing—a technique often used to secure passwords (among other things).  Instead of keeping your secret, “dog”, in plain text for everyone to see, I’ll store the ugly 32-character code (the code is commonly…