loyolaMDlogo

Loyola University Maryland Masters Data Security with Varonis

Loyola University Maryland, a leading private, Jesuit university, feared the possibility of falling victim to a fate that other major universities around them had experienced: a major data breach. In the months following the early 2014 attack on a major university nearby, Loyola’s CIO, Louise Finn, proactively explored various solutions that could mitigate risk in…

Continue Reading

Resources for a Junior Sysadmin Straight Out of College

Graduation is just a few months away! To prepare for your first job as a Junior Sysadmin, we have a few tips that will make you stand out: Before you graduate, take advantage of these free tools for students: Microsoft Student Developer Program GitHub Student Developer Pack All sysadmins should be equipped with basic security…

Continue Reading

cait blog post image.001

Explaining Cards Against IT

In an effort to disrupt the smooth running systems of our customers, we recently launched our Cards Against IT project. Specifically designed to sap the productivity of IT staff and pit them against one another – the game has been a smashing success. However, efforts beyond the walls of IT have not fared so well….

Continue Reading

Women in Data Security, Compliance, and Privacy You Should Follow on Twitter

There are many articles lately lamenting the lack of women in technology. I’m happy we’re having this discussion and that groups are working towards fixing the problem, but I’d like to shift the focus to the women that are in technology. The good news is that female technologists in data security, compliance, and privacy do…

Continue Reading

Start with Classification

Enterprise Search: Connecting File Data and Knowledge, Part III

In the last post in this series, I’ll now take on the topic of finding knowledge directly in the content. We’ve discussed how keyword queries can be made a lot smarter with schemas, which can fill in some of the conceptual background. Obviously, this is a great help in fine- tuning the keyword queries through…

Continue Reading

Privacy-Practices-2

Privacy by Design Cheat Sheet

Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high tech clients. Its several core principles have been adopted by U.S. government agencies and others as de facto best practices polices. PbD is about 20…

Continue Reading

Top 10 Chief Data Officers to Follow on Twitter

Will 2015 be the year of the Chief Data Officer (CDO)? It’s a question that’s coming up more and more often. Whether the CIOs are becoming overwhelmed with IT demands, or organizations are recognizing the value in their data, CDOs have a key role to play in data governance initiatives. A CDO’s mission is “to bring order…

Continue Reading

SOFTWARE PRODUCT OF THE YEAR

Varonis Metadata Framework Voted 2015 Software Product of the Year

Today Varonis is thrilled to report that our Metadata Framework was voted “Software Product of the Year” for 2015 by the UK’s Network Computing magazine, which is the UK’s longest established magazine dedicated to network management. In its ninth year, the winners of its award program are determined by online voting open to the public – such…

Continue Reading

cybersecurity

Should you get Cyber Insurance?

The latest string of data breaches has damaged reputations, spurring demand for cyber liability coverage. More specifically, recent findings by industry analysts report that spending on cyber liability insurance nearly doubled between 2013 and 2014 to about $2 billion.1 The Cost of a Data Breach To understand why so many organizations are buying cyber liability…

Continue Reading

Carbanak Attack Post-Mortem: Same Old Phish

The Kaspersky report about Carbanak malware released last month led to some pretty frightening headlines, usually starting with “Billion dollar heist…”.  Now that we’re over a month into reviewing some of the forensic evidence, it appears that Carbanak is less sophisticated than many first thought. At its heart, this was a spear phishing attack that…

Continue Reading