800px-Locked_wooden_door

Secrets of Active Directory Lockouts: How to Find Apps with Stale Credentials

No one needs to tell IT admins what’s on their short list of headaches: users forgetting their passwords usually ranks number one. For those who demand documented proof, there are survey results here to validate this point. Closely related, and just behind in terms of frequency and irritation level, are account lockouts. In an earlier…

Continue Reading

protips3

Tips From the Pros: 30TB, 1300 Users, and 400 SMB Shares

Q: How many users do you have and how much data are you managing?

A: We have about 1300 users and about 30TB of human generated data on file shares and SharePoint.

Continue Reading

active-directory

Top 10 Active Directory Tutorials on the Web

We’ve all heard of the many benefits of Active Directory (AD) for IT admins– it makes your job simpler because there’s a central vault of user information, and it’s scalable, supporting millions of objects in a single domain. However, it can be a pain in the ACLs to implement and maintain—a cluttered, misconfigured AD can…

Continue Reading

Podcast: Wi-Fi Security, Firesheep, and Pineapples with Troy Hunt

I recently had the pleasure of interviewing Troy Hunt, security researcher and Microsoft MVP.  If you haven’t read Troy’s blog or heard him speak, definitely check him out.  He’s truly one of the most prolific people in the security space these days. Troy and I chatted about: The exploitability of public Wi-Fi networks Cookie hijacking…

Continue Reading

800px-Alazani_Valley_Kakheti,_Georgia,_April_2007

Enterprise Search: Big Data Meets the Big Boss

Like many others, I think of Big Data as enormous data sets that are worthy of distributed processing, say in the multi-petabyte range. A petabyte for those who need a quick refresher is over 1 million gigabytes—a warehouse full of thumb drives. Typically, organizations enter the Big Data zone by collecting transactional data from tens…

Continue Reading

one-question-wish-breach-notification-letters-address

One Question I Wish all Breach Notification Letters Would Address

Recently, on two separate occasions, I received a new credit card and debit card, along with an ambiguous letter about why a new card was sent. My initial interpretation of the letter was that there had been a security breach.  However, calls to my credit card company and bank inquiring for more detailed information about…

Continue Reading

label

Gigaom Structure 2014: Big Data Needs Nutritional Information

Gigaom Structure, the Big Data conference that swept into town this week, proved yet again that this fuzzy name can mean a lot of different things to people.  Here’s a few things we learned from the speakers. For Formula 1 car makers, it’s the data collected from race drivers to fine tune their cars’ engines,…

Continue Reading

data breach timeline

An Interactive Timeline of a Data Breach

With major data breaches in the news, we thought it would make sense to give Metadata Era readers a big picture view of a hypothetical incident—from start to finish. And what better way to do this than through a highly interactive timeline. The actual details of this fictional breach involving a company we call AEM…

Continue Reading

4steps

Four Step Approach to Taming File Sharing Access

How many users and groups are in your Active Directory? Hundreds, thousands, tens of thousands?  Managing permissions to networked file shares at scale is complicated.   I don’t mean to alarm you, but: 1 TB of data usually contains about 50,000 folders About 5% of folders have unique permissions—that’s 2,500 ACLs Each ACL has an average of 4 groups Throw in multiple platforms with different permission schemes,…

Continue Reading