Ponemon Institute

Corporate Data: A Protected Asset or a Ticking Time Bomb?

How many days pass between big, publicized security breaches now? Not many. You’ve probably been worried about the state of data security, but you’re going to be surprised at just how out of control things really are. We asked the Ponemon Institute to survey employees and IT people from organizations large and small. Their eye-opening…

Continue Reading

12 Days of IT Security Presents

At the Metadata Era, we decided to start our holiday celebration early. We’ve put together 12 content gift packages that will point you to interesting blog posts, whitepapers, research reports, webinars, and even a few of our favorite tweets from the last year.  So pour an eggnog, sit by your laptop, and enjoy opening our…

Continue Reading

Varonis Perspective on the Sony Breach

While we have few details on the Sony Pictures attack itself, this very public breach (or pwning in hacker slang) has shown the extent of the actual exposure—it is massive. The always informative Krebs knows, at this point at least, as much as the rest of us—possible North Korean connection and perhaps the use of destructive erase-all malware….

Continue Reading

800px-Ancient_warded_lock_key_transparent

Crypto’s Fatal Flaw: Stealing the Master Key

At the beginning of the year, Cindy and I attended a crypto workshop held at a local college in NYC. We heard experts talk about a fact of life well known in the security world, less so in the IT space: crypto is not very healthy. The prime culprits are a slew of advanced persistent…

Continue Reading

636px-Cartomante

Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…

Continue Reading

varonis-office-365

Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…

Continue Reading

2003-donothing-migrate-and-upgrade

Windows Server 2003 End of Life is Approaching

The support for Windows Server 2003 is slated to end July 14, 2015, so it’s time to start thinking about migrating if you haven’t already. According to one TechNet blogger, the average Windows Server migration takes 200 days! The good news is that you aren’t the only IT department facing this reality. It’s anticipated that…

Continue Reading

A Sysadmins Guide to Thanksgiving

Continue Reading

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

Continue Reading

Six Authentication Experts You Should Follow on Twitter

Our recent ebook shows what’s wrong with current password-based authentication technology. Luckily, there are a few leading experts that are shaping the future of the post-password world. Here are six people you should follow and why: 1. Johannes Ullrich @johullrich Considered to be one of the 50 most powerful people in Networking by Network World,…

Continue Reading