ipswich logo

Ipswich Hospital Chooses DatAnywhere

Ipswich Hospital NHS Trust is a busy district general hospital in Suffolk, England. Its 3,500 employees serve the medical needs for a community of over 350,000 people. The Ipswich IT Team was recently faced with an information security challenge. How do you share sensitive, internal documents from the hospital file system with third-party organizations (insurance,…

Alex Is Smarter Than a Hacker [Contest]

We had a strong feeling that our Metadata Era readers were up to our hashing challenge. And they certainly came through. After reviewing many solutions, our judges have chosen Alex Bessonov of New Jersey as the contest winter. And his victory came just in the nick of time: his son’s Nexus 7 had recently stopped…

new-york-world_s-fair-1964-1

Privacy Predictions 2025!

After posting our IT predictions for next year, we decided to assign ourselves an even more challenging task. Using recent headlines from the tech press as a baseline, we tried to extrapolate ahead to the year 2025. Where might today’s stories about technology and privacy lead to in ten years if we don’t change how…

Ponemon Institute

Corporate Data: A Protected Asset or a Ticking Time Bomb?

How many days pass between big, publicized security breaches now? Not many. You’ve probably been worried about the state of data security, but you’re going to be surprised at just how out of control things really are. We asked the Ponemon Institute to survey employees and IT people from organizations large and small. Their eye-opening…

Varonis Perspective on the Sony Breach

While we have few details on the Sony Pictures attack itself, this very public breach (or pwning in hacker slang) has shown the extent of the actual exposure—it is massive. The always informative Krebs knows, at this point at least, as much as the rest of us—possible North Korean connection and perhaps the use of destructive erase-all malware….

636px-Cartomante

Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…

varonis-office-365

Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…

scawards2015nominee_678599_678600

Please Vote for Varonis in the SC Magazine Awards!

Dear Metadata Readers, When you have a moment please support Varonis by voting for us in SC Magazine’s 2015 *SC Awards. We’re nominated in the following Reader’s Trust Categories: Best Identity Management Solution: Varonis DataPrivilege Best Email Security Solution: Varonis DatAdvantage for Exchange Best DLP Solution: Varonis IDU Classification Framework Only subscribers of SC Magazine…

POODLE!

POODLE SSL Bug Scanner

As you may have noticed, there’s been widespread attention on this new POODLE SSL attack (CVE-2014-3566) that lets attackers spy on your traffic to any website that is vulnerable. As a public service, we’ve made a free, easy-to-use site that lets you scan any URL to see if it’s vulnerable and offers some helpful links to…

locks

CryptoLocker: The Marketing Behind the Malware

CryptoLocker is a frightening piece of malware that, when executed, encrypts your local and network files until a ransom is paid. CryptoLocker has well-implemented encryption that is generally considered unfeasible to brute force, as well as a multitude of distribution vectors—botnets, emails, Trojans, etc.  But what really sets CryptoLocker apart as ransomware, which has existed…