Windows 10’s Security Reboot, Part III: FIDO and Beyond

FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not ready to leap ahead to the password-less Universal Authentication Factor (UAF), which I touched on in the previous post in this series. So U2F is…

Continue Reading

FREE-ways-to-learn-IT-Security

Free Ways to Learn about IT Security

Technology startups have built a name for themselves, and the Labor Department slots tech jobs among the fastest growing this decade.1 New graduates, tech enthusiasts, and many others are working toward a position with an information technology company as a software developer, system administrator, or IT Manager. One aspect of IT not to be overlooked…

Continue Reading

health-insurance-and-wearable

What if Fitness Wearables Affected Our Health Insurance Rates?

Fitness wearables have been very popular, but sadly not very sticky. After 3-4 months, consumers tend to put them in a drawer and never wear them again. Many companies in this space think the solution might be to increase the value of the data that these fitness wearables collect. For instance, companies like FitBit started…

Continue Reading

Interview With Alexandra Ross, The Privacy Guru

Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies and procedures from the ground up. She is San Francisco based and consults with many Bay area tech companies. Her point of view on privacy…

Continue Reading

Top Minds in PCI Compliance

In 2014, over one billion records were breached.1 Among those breached, retail and financial industries were hit the hardest.  With Home Depot’s data breach, attackers hijacked payment data systems and stole over 100 million records such as payment card information and other sensitive customer data.2 With 2014 billed as “The Year of the Data Breach,”…

Continue Reading

Marshawn_Lynch_vs._Redskins_2014

Enterprise Search: Connecting File Data and Knowledge, Part II

If you’re like me, you use the autosuggestion box in Google (or your favorite search engine) to quickly confirm or learn new facts even without having to see the search results. Not sure how to spell the name of that Seattle Seahawks running back? Start entering in the first few letters, “mars,” and Google provides…

Continue Reading

public-private cloud

Public Versus Private Cloud File Sharing: Pros and Cons

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same beginner’s confusion about cloud computing services, or Enterprise File Sync and Share (EFSS). Public Cloud One reason why consumer file sharing services like Dropbox have…

Continue Reading

800px-Open_Make_Up_For_Ever_2013_-_Linda_Cerruti_-_Costanza_Ferro_-_18

Three Mistakes Not to Make When Choosing an Enterprise File Sync and Share Product

In recent years the user experience of file sharing products has improved tremendously. It’s rare these days to see people and companies struggling with FTP and weird proprietary methods of trying to handle common tasks like sharing a file. But a simplified user experience comes at a price. It can cause people to underestimate the…

Continue Reading

US Healthcare and Pharmaceutical Companies Are Vulnerable

A recent survey conducted by the Ponemon Institute suggests that more than half of U.S. healthcare and pharmaceutical employees believe that their organizations do not place a high priority on the protection of sensitive data. Commissioned by Varonis, the Ponemon survey looked at internal security risks as seen by IT employees. When examining the results…

Continue Reading

FDA

How Varonis Helps with the FDA

Title 21 Code of Federal Regulations (CFR) Part 11 regulates the United States’ Food and Drug Administration’s electronic records and signatures by outlining the criteria required to be considered trustworthy and reliable. Often referred to as Part 11, this regulation applies to electronic records that are created, modified, maintained, archived, retrieved, or transmitted. To learn…

Continue Reading