800px-Ancient_warded_lock_key_transparent

SSL and TLS 1.0 No Longer Acceptable for PCI Compliance

Last month, the PCI Council released version 3.1 of their Data Security Standard (DSS). While most of the changes in this minor release are clarifications, there is at least one significant update involving secure communication protocols. The Council has decided that SSL and TLS 1.0 can no longer be used after June 30, 2016. The…

More Work to Be Done in Preparation for the New EU Data Protection Regulation [Survey]

In March 2015 at CeBIT, Varonis asked show attendees about their general understanding of the upcoming EU Data Protection Regulation. The new rules reform the EU’s existing 1996 Data Protection Directive and are expected to go into effect later this year or next. Here’s a snapshot of some of the more important considerations in the…

640px-DSC32357,_Venetian_Resort_and_Casino,_Las_Vegas,_Nevada,_USA_(5472445441)

The ‘Varonis Track’ at EMC World 2015

Attending EMC World next month? Just as we did for RSA, we’ve come through again with our own ‘Varonis Track’—a special subset of sessions that we think will be of interest to Varonis customers, current and future. Security, Governance IT generalists and data security experts need to work together in the new cyberthreat environment. Partners…

800px-CATTLE_DRIVE_ON_RANCH_-_NARA_-_543776 (1)

Seven Free Data Wrangling Tools

Reformatting, de-duping, merging, and filtering are just some of the functions that go under the broad category of data wrangling. It’s all the scrubbing and cleaning that data scientists apply to raw data before it’s ready for real analysis. Even The New York Times ran an article about this less glamorous side of Big Data,…

Data Scientists Worth Following on Twitter

Many people who actually use the term “data scientist” don’t really like it. Isn’t science about data in the first place? It’s a bit redundant. But there is something special about what data scientists are actually doing. Drew Conway, PhD from NYU in Politics and now Head of Data at Sum, put together a neat…

Business Apps We’d Like to See on the Apple Watch

Anyone who’s been following the demos of the Apple Watch probably has one question on their mind: will it be ok to send frowny faces to IT admins? Maybe. More seriously, there is a definite business app potential to this latest Apple creation. At least one major enterprise software company has already stepped up to…

beckslogo

Beck’s Hybrids Reaps Greater Control of Company Data With Varonis DatAnywhere

Beck’s Hybrids, the largest family-owned, retail seed company in the United States, found itself faced with a dilemma as employee use of public cloud sharing solutions to collaborate and share documents began growing like a field of weeds. The company’s Systems Engineer Jeremy Hunt understood the business benefits of digital collaboration but was not comfortable…

800px-Moscone_Center,_San_Francisco_(2013)

The ‘Varonis Track’ at RSA Conference 2015

What do Doris Kearns Goodwin, Diana Nyad, and Alec Baldwin have in common? No, they weren’t all past guests on Stephen Colbert, but they will be speaking at this year’s upcoming RSA Conference! The Varonis team will also be there (North Expo #N3141) to talk security and data governance, as well as to showcase our…

loyolaMDlogo

Loyola University Maryland Masters Data Security with Varonis

Loyola University Maryland, a leading private, Jesuit university, feared the possibility of falling victim to a fate that other major universities around them had experienced: a major data breach. In the months following the early 2014 attack on a major university nearby, Loyola’s CIO, Louise Finn, proactively explored various solutions that could mitigate risk in…

Carbanak Attack Post-Mortem: Same Old Phish

The Kaspersky report about Carbanak malware released last month led to some pretty frightening headlines, usually starting with “Billion dollar heist…”.  Now that we’re over a month into reviewing some of the forensic evidence, it appears that Carbanak is less sophisticated than many first thought. At its heart, this was a spear phishing attack that…