Business Apps We’d Like to See on the Apple Watch

Anyone who’s been following the demos of the Apple Watch probably has one question on their mind: will it be ok to send frowny faces to IT admins? Maybe. More seriously, there is a definite business app potential to this latest Apple creation. At least one major enterprise software company has already stepped up to…

800px-Moscone_Center,_San_Francisco_(2013)

The ‘Varonis Track’ at RSA Conference 2015

What do Doris Kearns Goodwin, Diana Nyad, and Alec Baldwin have in common? No, they weren’t all past guests on Stephen Colbert, but they will be speaking at this year’s upcoming RSA Conference! The Varonis team will also be there (North Expo #N3141) to talk security and data governance, as well as to showcase our…

The Short List: Tips and Tools for Data Security Beginners

Lately we’ve been focusing on free resources that are available to help bring IT admins up to speed on security matters. Along these lines, I put together a short list of essential tips and tools to let you hit the ground running — actionable ideas and software that will make you productive on Day 1….

Start with Classification

Enterprise Search: Connecting File Data and Knowledge, Part III

In the last post in this series, I’ll now take on the topic of finding knowledge directly in the content. We’ve discussed how keyword queries can be made a lot smarter with schemas, which can fill in some of the conceptual background. Obviously, this is a great help in fine- tuning the keyword queries through…

Privacy-Practices-2

Privacy by Design Cheat Sheet

Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high tech clients. Its several core principles have been adopted by U.S. government agencies and others as de facto best practices polices. PbD is about 20…

SOFTWARE PRODUCT OF THE YEAR

Varonis Metadata Framework Voted 2015 Software Product of the Year

Today Varonis is thrilled to report that our Metadata Framework was voted “Software Product of the Year” for 2015 by the UK’s Network Computing magazine, which is the UK’s longest established magazine dedicated to network management. In its ninth year, the winners of its award program are determined by online voting open to the public – such…

Carbanak Attack Post-Mortem: Same Old Phish

The Kaspersky report about Carbanak malware released last month led to some pretty frightening headlines, usually starting with “Billion dollar heist…”.  Now that we’re over a month into reviewing some of the forensic evidence, it appears that Carbanak is less sophisticated than many first thought. At its heart, this was a spear phishing attack that…

State of PCI Compliance 2014

Last year when we wrote about Verizon’s PCI Compliance report, the news was not very encouraging. Only 11% of companies in the Verizon sample passed all 12 of the PCI Data Security Standard (DSS) 2.0’s controls. For hackers, it meant that in 2013 they were unlucky if they found themselves on a compliant site! The…

Windows 10’s Security Reboot, Part III: FIDO and Beyond

FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not ready to leap ahead to the password-less Universal Authentication Factor (UAF), which I touched on in the previous post in this series. So U2F is…

Interview With Alexandra Ross, The Privacy Guru

Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies and procedures from the ground up. She is San Francisco based and consults with many Bay area tech companies. Her point of view on privacy…