Helping Brands Understand COPPA, Part II

In Part I, Dan gave a lot of background on COPPA and offered some tips for understanding whether your business is impacted by the new regulations. Now, he digs into the nitty gritty.

Continue Reading

Tips From The Pros: Organizing Access For 15TB of File Data

More from our Tips interviews with working IT professionals.  

Tell me about your environment—how many users, how much data, etc.?

 A: We have over 600 users and 15TB of shared CIFS data. We have a single domain that contains over 1000 security groups.

Continue Reading

cybersecurity shield

Is 2014 the Year We Get Serious About Cyber Attacks?

In 2013, President Obama signed executive order 13636, Improving Critical Infrastructure Cybersecurity, which besides getting a lot of attention, also called for the National Institute of Standards and Technology (NIST) to develop guidelines for dealing with cyber threats to the nation’s core infrastructure. NIST has since released a preliminary framework that’s expected to be finalized in February 2014….

Continue Reading

[Interactive Visual] The New Normal: Malware

As Metadata Era regulars know, we’ve been getting a lot of mileage out of Verizon’s Data Breach Investigations Report (DBIR). While we’re waiting for Verizon to tally up breach incidents for 2013, we thought it would be worthwhile to take a closer look at one particularly ominous attack vector from last year’s report. Malware is…

Continue Reading

Helping Brands Understand COPPA, Part I

This is the start of a two-part series on the privacy and data security implication of COPPA. Dan Nelson is an entrepreneur and founder of KPass, an NYC-based  startup focused on safe oneline identities for children.  Dan has recently spoken about COPPA at the Family Online Safety Institute conference in Washington. The Children’s Online Privacy…

Continue Reading

New Gigaom Research on Human-Generated Big Data Analytics

Gigaom analyst Paul Miller just published a fresh research paper on applying big data analytics to human-generated data.  Check it out, it’s a great read! This Gigaom Pro whitepaper is 100% for our readers. What is human-generated data, you ask?  It’s the documents, spreadsheets, emails, text messages, etc. that you create, read, modify, delete, and…

Continue Reading

cc

My Credit Card Was Stolen (Again). It’s OK. Here’s Why.

Nothing brings holiday cheer quite like a massive data breach.  For anyone not in the loop, retail giant Target was hacked last month, resulting in the compromise of more than 40 million credit and debit cards. My credit card was one of the unlucky ones that was pilfered and, this weekend, a thief decided to…

Continue Reading

Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data

In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control of  human-generated data—the fast growing digital element in organizations today. In this inaugural post, we spoke recently with one of our customers about managing large…

Continue Reading