800px-CATTLE_DRIVE_ON_RANCH_-_NARA_-_543776 (1)

Seven Free Data Wrangling Tools

Reformatting, de-duping, merging, and filtering are just some of the functions that go under the broad category of data wrangling. It’s all the scrubbing and cleaning that data scientists apply to raw data before it’s ready for real analysis. Even The New York Times ran an article about this less glamorous side of Big Data,…

Continue Reading

Data Scientists Worth Following on Twitter

Many people who actually use the term “data scientist” don’t really like it. Isn’t science about data in the first place? It’s a bit redundant. But there is something special about what data scientists are actually doing. Drew Conway, PhD from NYU in Politics and now Head of Data at Sum, put together a neat…

Continue Reading

Business Apps We’d Like to See on the Apple Watch

Anyone who’s been following the demos of the Apple Watch probably has one question on their mind: will it be ok to send frowny faces to IT admins? Maybe. More seriously, there is a definite business app potential to this latest Apple creation. At least one major enterprise software company has already stepped up to…

Continue Reading

beckslogo

Beck’s Hybrids Reaps Greater Control of Company Data With Varonis DatAnywhere

Beck’s Hybrids, the largest family-owned, retail seed company in the United States, found itself faced with a dilemma as employee use of public cloud sharing solutions to collaborate and share documents began growing like a field of weeds. The company’s Systems Engineer Jeremy Hunt understood the business benefits of digital collaboration but was not comfortable…

Continue Reading

800px-Moscone_Center,_San_Francisco_(2013)

The ‘Varonis Track’ at RSA Conference 2015

What do Doris Kearns Goodwin, Diana Nyad, and Alec Baldwin have in common? No, they weren’t all past guests on Stephen Colbert, but they will be speaking at this year’s upcoming RSA Conference! The Varonis team will also be there (North Expo #N3141) to talk security and data governance, as well as to showcase our…

Continue Reading

The Short List: Tips and Tools for Data Security Beginners

Lately we’ve been focusing on free resources that are available to help bring IT admins up to speed on security matters. Along these lines, I put together a short list of essential tips and tools to let you hit the ground running — actionable ideas and software that will make you productive on Day 1….

Continue Reading

loyolaMDlogo

Loyola University Maryland Masters Data Security with Varonis

Loyola University Maryland, a leading private, Jesuit university, feared the possibility of falling victim to a fate that other major universities around them had experienced: a major data breach. In the months following the early 2014 attack on a major university nearby, Loyola’s CIO, Louise Finn, proactively explored various solutions that could mitigate risk in…

Continue Reading

Resources for a Junior Sysadmin Straight Out of College

Graduation is just a few months away! To prepare for your first job as a Junior Sysadmin, we have a few tips that will make you stand out: Before you graduate, take advantage of these free tools for students: Microsoft Student Developer Program GitHub Student Developer Pack All sysadmins should be equipped with basic security…

Continue Reading

cait blog post image.001

Explaining Cards Against IT

In an effort to disrupt the smooth running systems of our customers, we recently launched our Cards Against IT project. Specifically designed to sap the productivity of IT staff and pit them against one another – the game has been a smashing success. However, efforts beyond the walls of IT have not fared so well….

Continue Reading

Women in Data Security, Compliance, and Privacy You Should Follow on Twitter

There are many articles lately lamenting the lack of women in technology. I’m happy we’re having this discussion and that groups are working towards fixing the problem, but I’d like to shift the focus to the women that are in technology. The good news is that female technologists in data security, compliance, and privacy do…

Continue Reading