what you may have missed

What You May Have Missed

1. In a previous post, we mentioned firms interested in disrupting the data broker business by empowering consumers to share their personal information with companies and get paid for it too. However, it’s still unclear whether customers are worried enough about their privacy to embrace these new services. At the Annual Meeting of the New…

personality-traits-more-prone-to-phishing

Do Certain Traits Make People Vulnerable to Phishing?

The Computer Emergency Response Team (CERT) at Carnegie-Mellon University is a research institute devoted to computer and network security. CERT is often referenced by other security researchers, and for good reason: they have deep knowledge of vulnerabilities and have developed cyber-engineering techniques both to analyze and prevent attacks. CERT also has an entire practice area…

Announcing the Varonis Connect Community

Do you have feature requests for us?  Ever want to discuss a product customization with an engineer?  Looking for a certain how-to video?  Look no further!  Today, we’re happy to announce a new online community for Varonis customers and partners. Varonis Connect is a friendly community where you can exchange ideas and information, participate in…

Announcing DatAnywhere 2.0

We’re pleased to announce that version 2.0 of Varonis DatAnywhere is now generally available. Our engineering team continues to add new features at a rapid pace! What’s new in 2.0? Stub files. Stub files make files appear and behave as if they’re stored locally on the client, but they remain safely on your file shares…

hidden - keys-partial

Deadly credential vulnerabilities found in mobile apps

I’m beginning to be known around here as the bearer of bad news on authentication hacks. Unfortunately, I have more to share. In June, researchers at Columbia University announced they discovered secret login keys hidden in thousands of Google Play apps. Left by developers to access their own cloud-based accounts—on Facebook, AWS, Twitter, and other…

8 Things You Didn’t Know About Security Regulations (#4 is Crazy!)

1. The HHS has a “Wall of Shame”.

In the US, the Health Insurance Portability and Accountability Act (HIPAA) requires hospitals, insurers, and other “covered entities” to take a few steps after a breach of protected health information (PHI). Many are familiar with the rule that you have to directly notify the patient when there’s been exposure of unprotected PHI.

4 Things You Need to Know About the Future of File Sharing

Have you been in this movie? You’ve been working for two months on a big project to analyze widgets — sales, marketing effectiveness, whatever. The first real deliverable is a presentation. A few versions are in your team’s shared folder, a few copies have been sent via email, one is in your home folder, your designer…

Latest Varonis Survey Reveals the Speed Bumps to Ubiquitous Enterprise Search

We can’t imagine modern consumer life without search engines to help us find Web content that answers our most pressing questions. But in the business world, the situation is almost reversed—we’ve settled for pre-Internet era file search technology to locate the documents and information that help us do our jobs. In a Varonis survey of…

What you may have missed

What You May Have Missed

1. The Department of Health and Human Services is hoping to send a firm message to the industry – be prepared for higher HIPAA fines if you don’t pass your audit! The Department of HHS’ Office of Civil Rights has received numerous security complaints about organizations that have failed to perform a comprehensive HIPAA-mandated risk…

File Shares

Which Cloud File Sharing Service Should You Use?

Many companies with massive amounts of file share data are scrambling to find cloud file storage that meets their highly specialized needs, all while balancing security, convenience, and cost. But what if we flip the problem on its head? Instead of abandoning battle-tested file shares, what if we enhance their capabilities?