hello hacker

Lessons from OPM: Turning Security Inside Out With User Behavior Analytics

The US Office of Personnel Management (OPM) suffered a massive breach in early June. They publicly announced that the personally identifiable information or PII of over 4 million current and former government workers had likely been scooped up by hackers. Who done it? At this point, there’s some interesting speculation about the source of the…

enterprise knowledge

Enterprise Search: Our White Paper Looks Into the Future of Business Knowledge

As enterprise search catches on — thanks to our own DatAnswers — corporate users may be wondering where this technology is leading. In our newest white paper, Enterprise Knowledge: Unlocking Hidden Knowledge in Unstructured Data, we provide a roadmap for the next few miles. Enterprise search can speedily find file content matching the right keywords. And…

800px-0618-mostnasoci

Light at End of Tunnel for EU Data Regulations

We’ve been posting about the EU’s new regulations for over two years, watching this slow train move in fits and starts. But the long strange journey may soon come to an end.  It’s now likely that the Data Protection Regulation (DPR) will be approved by the end of 2015 or early next year. Of course,…

Winner of Our Insider Threat Data Analysis Contest

Once again our readers have proven themselves up to the challenge of imaginatively solving Metadata Era contest problems. In our last go-around, we asked you to take some basic data points about file access in a hypothetical company and decide whether insiders were lurking. To refresh memories, the problem states there are 100 employees with…

Verizon DBIR 2015: CVEs Never Die

Major data security conferences such as RSA or InfoSecurity are a great way to absorb lots of deep information very quickly. After spending an afternoon reviewing RSA videos from last month’s event, one of the clear takeaways is that hackers  continue to use the same old tricks. This is old news to us at the…

534px-Wall_Street_&_Broadway

SEC Rates Brokers on Cybersecurity

The U.S. Securities and Exchange Commission (SEC) is in the business of regulating the securities markets. They’ve been given the responsibility for the basic integrity of market operations—keeping the stock and bond exchanges going and ensuring that investors have the latest information. It’s in their role as market guardians that SEC decision makers have started…

1024px-Routemaster_Bus,_Piccadilly_Circus

‘Varonis Track’ at InfoSecurity Europe

This is getting to be a regular feature. Another conference, and another request from our readers to put together a Varonis Track. The conference this time is InfoSecurity Europe, which will touchdown in London June 2 – June 4. If you’re at InfoSecurity Europe, stop by to chat with the Varonis crew. We’ll be at…

malware marquee

Let’s Go to the RSA Videos!

For your viewing pleasure, the RSA folks have generously released the video recordings of most of the presentations from last month’s conference. So I bought popcorn, got an aisle seat, and spent an afternoon at the data security movies. My goal was to find themes in the hacker and malware-oriented talks. Like a Hollywood script,…

New Venn - insider

The Metadata Era Data Analysis Contest

Courtesy of Dato’s co-founder Danny Bickson, we’ve come into possession of a three tickets for the Data Science Summit & Dato Conference being held in San Francisco July 20 -21. Thanks Danny! Researchers from Microsoft, Google, Cloudera, Carnegie-Mellon, and Stanford will be on hand to talk data. The Summit, by the way, has been organized by O’Reilly Media’s Chief Data Scientist, Dr. Ben Lorica.

Verizon DBIR 2015: Data Science Takes on Insiders

The 2015 edition of Verizon’s Data Breach Investigations Report, this blog’s favorite source of hacking stats, was published recently. As always, there’s great information included, and we can’t possibly cover all the interesting nuggets — breach costs, secondary victims — in a single post. Hint: there’ll be more on DBIR 2015 in future posts. This…