Varonis Perspective on the Sony Breach

While we have few details on the Sony Pictures attack itself, this very public breach (or pwning in hacker slang) has shown the extent of the actual exposure—it is massive. The always informative Krebs knows, at this point at least, as much as the rest of us—possible North Korean connection and perhaps the use of destructive erase-all malware….


Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…


Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…


Please Vote for Varonis in the SC Magazine Awards!

Dear Metadata Readers, When you have a moment please support Varonis by voting for us in SC Magazine’s 2015 *SC Awards. We’re nominated in the following Reader’s Trust Categories: Best Identity Management Solution: Varonis DataPrivilege Best Email Security Solution: Varonis DatAdvantage for Exchange Best DLP Solution: Varonis IDU Classification Framework Only subscribers of SC Magazine…


POODLE SSL Bug Scanner

As you may have noticed, there’s been widespread attention on this new POODLE SSL attack (CVE-2014-3566) that lets attackers spy on your traffic to any website that is vulnerable. As a public service, we’ve made a free, easy-to-use site that lets you scan any URL to see if it’s vulnerable and offers some helpful links to…


CryptoLocker: The Marketing Behind the Malware

CryptoLocker is a frightening piece of malware that, when executed, encrypts your local and network files until a ransom is paid. CryptoLocker has well-implemented encryption that is generally considered unfeasible to brute force, as well as a multitude of distribution vectors—botnets, emails, Trojans, etc.  But what really sets CryptoLocker apart as ransomware, which has existed…

What You May Have Missed

What You May Have Missed

1. Here’s an interesting perspective from a CTO on why metadata matters. 2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect student data and their privacy. Major protections of SB 1177 include prohibiting any website or mobile app from targeted advertising to K-12 students, their parents…

what you may have missed

What You May Have Missed

1. In a previous post, we mentioned firms interested in disrupting the data broker business by empowering consumers to share their personal information with companies and get paid for it too. However, it’s still unclear whether customers are worried enough about their privacy to embrace these new services. At the Annual Meeting of the New…

What You May Have Missed

What You May Have Missed

1. Recently, the United Kingdom’s Information Commissioner’s Office published a Big Data report along with suggestions on how to comply with the Data Protection Act. Prepared by the European Data Protection Authority, their primary goal is to ensure that big data’s privacy risks and benefits are considered. If you don’t have time to read the…


VMworld Attendees: Chance to Win Wireless Speakers

Are you attending VMworld 2014 in San Francisco? Had your eyes on the very cool Jabra Wireless Speakers?  Like to tweet pictures of yourself? If you answered “yes” to all of these, then you’re in luck! Stop by the Varonis booth (#2323) to enter our speaker contest. Instructions below.