bruce

Cryptography May Not Be Dead, But It Is on Life Support

Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce Schneier discuss the implications of the Snowden documents. But we quickly learned from others sessions that there was an underlying context to this conference.  Over…

Helping Brands Understand COPPA, Part II

In Part I, Dan gave a lot of background on COPPA and offered some tips for understanding whether your business is impacted by the new regulations. Now, he digs into the nitty gritty.

cc

My Credit Card Was Stolen (Again). It’s OK. Here’s Why.

Nothing brings holiday cheer quite like a massive data breach.  For anyone not in the loop, retail giant Target was hacked last month, resulting in the compromise of more than 40 million credit and debit cards. My credit card was one of the unlucky ones that was pilfered and, this weekend, a thief decided to…

banksy

If the NSA can’t track its data, how can you?

I have a simple test for you.  Let’s call it the Snowden test: Create a folder named “Highly Confidential” on your company’s shared file server Put a few meaningless files with top-secret file names into the folder Delete the folder Now for the fun part—call your IT department and ask them what happened to your…

Introducing DatAnywhere 1.5

We’re happy to announce today that DatAnywhere 1.5 is generally available.  DatAnywhere has gained strong adoption in its first year of existence, helping organizations deliver the cloud file sync experience using corporate file servers and NAS devices. One of the key benefits of DatAnywhere over other private cloud solutions is how simple it is to…

ssh-2

How Did Snowden (Really) Do It?

I recently stumbled across an article in Dark Reading entitled “How Did Snowden Do It?”  The piece does a great job pointing out how failures in authentication allowed Snowden to gain access to sensitive data repositories, acting both as himself and impersonating other privileged users. The author states that Snowden a.) used social-engineering to convince…

isilon

Varonis Adds Support for EMC Isilon

Download the EMC-Varonis Partner datasheet here. One of the biggest benefits of the Varonis Data Governance Suite is the wide platform support.  This is important for two very significant reasons: 1.) We want to help customers manage and protect their data wherever it lives without forcing them to move into a document management silo.  We…

forbes

Forbes: Do You Know Where Your Data Is And Who Reads It? Varonis Knows

Gil Press, Forbes contributor, wrote a fantastic piece on Varonis.  My favorite part of the article: More often than not, the exposure of sensitive information to unauthorized insiders and outsiders is simply inadvertent. Gibson told me about a casino where the first line of the Varonis risk management report revealed that 15 million credit card…

The Value of Sandboxes

There’s been a lot of talk about malware sandboxing as a form of protection against advanced persistent threats (APTs). The idea behind malware sandboxing is that you can drop suspicious binaries into a virtualized environment, execute them, and observe what happens without posing any risk to your production systems.  After the malicious code wreaks its…