Interview With Alexandra Ross, The Privacy Guru

Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies and procedures from the ground up. She is San Francisco based and consults with many Bay area tech companies. Her point of view on privacy…

Continue Reading

Top Minds in PCI Compliance

In 2014, over one billion records were breached.1 Among those breached, retail and financial industries were hit the hardest.  With Home Depot’s data breach, attackers hijacked payment data systems and stole over 100 million records such as payment card information and other sensitive customer data.2 With 2014 billed as “The Year of the Data Breach,”…

Continue Reading

Marshawn_Lynch_vs._Redskins_2014

Enterprise Search: Connecting File Data and Knowledge, Part II

If you’re like me, you use the autosuggestion box in Google (or your favorite search engine) to quickly confirm or learn new facts even without having to see the search results. Not sure how to spell the name of that Seattle Seahawks running back? Start entering in the first few letters, “mars,” and Google provides…

Continue Reading

public-private cloud

Public Versus Private Cloud File Sharing: Pros and Cons

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same beginner’s confusion about cloud computing services, or Enterprise File Sync and Share (EFSS). Public Cloud One reason why consumer file sharing services like Dropbox have…

Continue Reading

800px-Open_Make_Up_For_Ever_2013_-_Linda_Cerruti_-_Costanza_Ferro_-_18

Three Mistakes Not to Make When Choosing an Enterprise File Sync and Share Product

In recent years the user experience of file sharing products has improved tremendously. It’s rare these days to see people and companies struggling with FTP and weird proprietary methods of trying to handle common tasks like sharing a file. But a simplified user experience comes at a price. It can cause people to underestimate the…

Continue Reading

US Healthcare and Pharmaceutical Companies Are Vulnerable

A recent survey conducted by the Ponemon Institute suggests that more than half of U.S. healthcare and pharmaceutical employees believe that their organizations do not place a high priority on the protection of sensitive data. Commissioned by Varonis, the Ponemon survey looked at internal security risks as seen by IT employees. When examining the results…

Continue Reading

FDA

How Varonis Helps with the FDA

Title 21 Code of Federal Regulations (CFR) Part 11 regulates the United States’ Food and Drug Administration’s electronic records and signatures by outlining the criteria required to be considered trustworthy and reliable. Often referred to as Part 11, this regulation applies to electronic records that are created, modified, maintained, archived, retrieved, or transmitted. To learn…

Continue Reading

Ontario_Wa-31

How to Detect Dropbox on Your Network

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list of increasingly serious complaints from their users: It was difficult to establish who owned which documents (an important issue when writing your dissertation). It was…

Continue Reading

fido-x

Windows 10’s Security Reboot, Part II: More on Authentication

A good part of Windows 10’s security improvements center on basic changes to the way users and software prove their identities. No, that wasn’t a mistake in the last sentence. Software, like, people, also can have an identity and be required to show they’re the apps they say they are. The underlying technology is well…

Continue Reading

nist

How Varonis Helps with NIST

In 2013 the President directed the National Institute of Standards and Technology (NIST) to develop a framework for reducing cyber risks to critical infrastructure.  And on February 12, 2014, NIST released the first version of the Framework for Improving Critical Infrastructure Cybersecurity. The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and…

Continue Reading