idg

Agree to Disagree: IDG’s 2015 Big Data Survey Findings

Recently IDG released the results of their 2015 Big Data and Analytics Survey. The objective of the survey is to gain a deeper understanding of organizations’ big data goals and tactics. Interestingly enough, survey findings highlight a lot of what we frequently discuss at the Metadata Era. Restrict Access to Sensitive Data One finding is…

O365_cover

Announcing DatAdvantage for Microsoft Office 365

We’re excited to announce the beta release of DatAdvantage for Microsoft Office 365 – with permissions visibility for Microsoft Exchange Online, SharePoint Online, OneDrive, and visibility into Active Directory for Azure. Also included in this release is Data Classification Framework support for SharePoint Online and OneDrive, so that you can identify and lock down sensitive…

malware marquee

Let’s Go to the RSA Videos!

For your viewing pleasure, the RSA folks have generously released the video recordings of most of the presentations from last month’s conference. So I bought popcorn, got an aisle seat, and spent an afternoon at the data security movies. My goal was to find themes in the hacker and malware-oriented talks. Like a Hollywood script,…

Verizon DBIR 2015: Data Science Takes on Insiders

The 2015 edition of Verizon’s Data Breach Investigations Report, this blog’s favorite source of hacking stats, was published recently. As always, there’s great information included, and we can’t possibly cover all the interesting nuggets — breach costs, secondary victims — in a single post. Hint: there’ll be more on DBIR 2015 in future posts. This…

How to Create a Good Security Policy

CIOs have taken note of the nightmarish scenarios data breaches can bring – remember Sony and Target? To combat this ticking time bomb, they’ve beefed up their security budgets. The Computer Emergency Response Team (CERT) at Carnegie-Mellon University also recommends creating a security policy which you can to refer to if your systems are compromised. Why…

800px-New_York_Court_of_Appeals_hearing_oral_arguments

Can We Trust Autopsy Results in Canada (or Anywhere)?

As if we didn’t have enough bad news about evidence used in the court room, now comes a story out of Canada about the security of court records. In testimony given at a trial in Alberta, Dr. Anny Sauvageau, the province’s former chief medical examiner, said that the government’s court IT system had little or…

The Short List: Tips and Tools for Data Security Beginners

Lately we’ve been focusing on free resources that are available to help bring IT admins up to speed on security matters. Along these lines, I put together a short list of essential tips and tools to let you hit the ground running — actionable ideas and software that will make you productive on Day 1….

Women in Data Security, Compliance, and Privacy You Should Follow on Twitter

There are many articles lately lamenting the lack of women in technology. I’m happy we’re having this discussion and that groups are working towards fixing the problem, but I’d like to shift the focus to the women that are in technology. The good news is that female technologists in data security, compliance, and privacy do…

Privacy-Practices-2

Privacy by Design Cheat Sheet

Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high tech clients. Its several core principles have been adopted by U.S. government agencies and others as de facto best practices polices. PbD is about 20…

Windows 10’s Security Reboot, Part III: FIDO and Beyond

FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not ready to leap ahead to the password-less Universal Authentication Factor (UAF), which I touched on in the previous post in this series. So U2F is…