3 Things CIOs Can Learn From Snapchat

Snapchat, one of the most popular mobile apps amongst teenage girls, can teach CIOs a thing or three about technology and communication. 1. Data should have a shelf-life The flagship feature of Snapchat is ephemerality. Snaps are designed to disappear forever* in 10 seconds or less. This cuts against the grain of most social services…

Continue Reading


Cryptography May Not Be Dead, But It Is on Life Support

Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce Schneier discuss the implications of the Snowden documents. But we quickly learned from others sessions that there was an underlying context to this conference.  Over…

Continue Reading


The Year Ahead in Data Protection Regulations

One area we expect to see interesting movement in 2014 is the role of government in setting data security regulations and policy. Sure, the EU has long had far more comprehensive regulations than the US, but a few recent events have helped to raise US public awareness of security and privacy. Is this the year…

Continue Reading

Helping Brands Understand COPPA, Part II

In Part I, Dan gave a lot of background on COPPA and offered some tips for understanding whether your business is impacted by the new regulations. Now, he digs into the nitty gritty.

Continue Reading

Tips From The Pros: Organizing Access For 15TB of File Data

More from our Tips interviews with working IT professionals.  

Tell me about your environment—how many users, how much data, etc.?

 A: We have over 600 users and 15TB of shared CIFS data. We have a single domain that contains over 1000 security groups.

Continue Reading

cybersecurity shield

Is 2014 the Year We Get Serious About Cyber Attacks?

In 2013, President Obama signed executive order 13636, Improving Critical Infrastructure Cybersecurity, which besides getting a lot of attention, also called for the National Institute of Standards and Technology (NIST) to develop guidelines for dealing with cyber threats to the nation’s core infrastructure. NIST has since released a preliminary framework that’s expected to be finalized in February 2014….

Continue Reading

[Interactive Visual] The New Normal: Malware

As Metadata Era regulars know, we’ve been getting a lot of mileage out of Verizon’s Data Breach Investigations Report (DBIR). While we’re waiting for Verizon to tally up breach incidents for 2013, we thought it would be worthwhile to take a closer look at one particularly ominous attack vector from last year’s report. Malware is…

Continue Reading

Helping Brands Understand COPPA, Part I

This is the start of a two-part series on the privacy and data security implication of COPPA. Dan Nelson is an entrepreneur and founder of KPass, an NYC-based  startup focused on safe oneline identities for children.  Dan has recently spoken about COPPA at the Family Online Safety Institute conference in Washington. The Children’s Online Privacy…

Continue Reading

New Gigaom Research on Human-Generated Big Data Analytics

Gigaom analyst Paul Miller just published a fresh research paper on applying big data analytics to human-generated data.  Check it out, it’s a great read! This Gigaom Pro whitepaper is 100% for our readers. What is human-generated data, you ask?  It’s the documents, spreadsheets, emails, text messages, etc. that you create, read, modify, delete, and…

Continue Reading


My Credit Card Was Stolen (Again). It’s OK. Here’s Why.

Nothing brings holiday cheer quite like a massive data breach.  For anyone not in the loop, retail giant Target was hacked last month, resulting in the compromise of more than 40 million credit and debit cards. My credit card was one of the unlucky ones that was pilfered and, this weekend, a thief decided to…

Continue Reading