532px-EU_flag-map

Will the EU’s Data Protection Regulation Apply to Me?

One of the more complex issues that will have to be resolved with the new Data Protection Regulation (DPR) is what’s being called “extraterritoriality.” As proposed by EU Parliament, the DPR will apply to any data transferred outside the EU zone. So under these new rules, if a US company collects data from EU citizens,…

What is User Behavior Analytics?

There’s nothing new in using analytics in data protection or breach prevention. Firewalls, for example, analyze packet contents and other metadata, such as IP addresses, to detect and block attackers from gaining entry. And anti-virus software is constantly scanning file systems for malware by looking for bits of code and other signs that a file…

uba

Point of View: User Behavior Analytics and Varonis [White Paper]

User Behavior Analytics, or UBA, has suddenly entered the security conversation. Security folks are talking about it. Analysts are talking about it. It’s in the news. It’s a good conversation to have, and at Varonis, we’re glad it’s finally receiving the attention it deserves. We knew ten years ago that to really understand and govern…

hello hacker

Lessons from OPM: Turning Security Inside Out With User Behavior Analytics

The US Office of Personnel Management (OPM) suffered a massive breach in early June. They publicly announced that the personally identifiable information or PII of over 4 million current and former government workers had likely been scooped up by hackers. Who done it? At this point, there’s some interesting speculation about the source of the…

enterprise knowledge

Enterprise Search: Our White Paper Looks Into the Future of Business Knowledge

As enterprise search catches on — thanks to our own DatAnswers — corporate users may be wondering where this technology is leading. In our newest white paper, Enterprise Knowledge: Unlocking Hidden Knowledge in Unstructured Data, we provide a roadmap for the next few miles. Enterprise search can speedily find file content matching the right keywords. And…

800px-0618-mostnasoci

Light at End of Tunnel for EU Data Regulations

We’ve been posting about the EU’s new regulations for over two years, watching this slow train move in fits and starts. But the long strange journey may soon come to an end.  It’s now likely that the Data Protection Regulation (DPR) will be approved by the end of 2015 or early next year. Of course,…

Winner of Our Insider Threat Data Analysis Contest

Once again our readers have proven themselves up to the challenge of imaginatively solving Metadata Era contest problems. In our last go-around, we asked you to take some basic data points about file access in a hypothetical company and decide whether insiders were lurking. To refresh memories, the problem states there are 100 employees with…

Verizon DBIR 2015: CVEs Never Die

Major data security conferences such as RSA or InfoSecurity are a great way to absorb lots of deep information very quickly. After spending an afternoon reviewing RSA videos from last month’s event, one of the clear takeaways is that hackers  continue to use the same old tricks. This is old news to us at the…

534px-Wall_Street_&_Broadway

SEC Rates Brokers on Cybersecurity

The U.S. Securities and Exchange Commission (SEC) is in the business of regulating the securities markets. They’ve been given the responsibility for the basic integrity of market operations—keeping the stock and bond exchanges going and ensuring that investors have the latest information. It’s in their role as market guardians that SEC decision makers have started…

1024px-Routemaster_Bus,_Piccadilly_Circus

‘Varonis Track’ at InfoSecurity Europe

This is getting to be a regular feature. Another conference, and another request from our readers to put together a Varonis Track. The conference this time is InfoSecurity Europe, which will touchdown in London June 2 – June 4. If you’re at InfoSecurity Europe, stop by to chat with the Varonis crew. We’ll be at…