US Healthcare and Pharmaceutical Companies Are Vulnerable

A recent survey conducted by the Ponemon Institute suggests that more than half of U.S. healthcare and pharmaceutical employees believe that their organizations do not place a high priority on the protection of sensitive data. Commissioned by Varonis, the Ponemon survey looked at internal security risks as seen by IT employees. When examining the results…

Continue Reading

FDA

How Varonis Helps with the FDA

Title 21 Code of Federal Regulations (CFR) Part 11 regulates the United States’ Food and Drug Administration’s electronic records and signatures by outlining the criteria required to be considered trustworthy and reliable. Often referred to as Part 11, this regulation applies to electronic records that are created, modified, maintained, archived, retrieved, or transmitted. To learn…

Continue Reading

Ontario_Wa-31

How to Detect Dropbox on Your Network

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list of increasingly serious complaints from their users: It was difficult to establish who owned which documents (an important issue when writing your dissertation). It was…

Continue Reading

fido-x

Windows 10’s Security Reboot, Part II: More on Authentication

A good part of Windows 10’s security improvements center on basic changes to the way users and software prove their identities. No, that wasn’t a mistake in the last sentence. Software, like, people, also can have an identity and be required to show they’re the apps they say they are. The underlying technology is well…

Continue Reading

nist

How Varonis Helps with NIST

In 2013 the President directed the National Institute of Standards and Technology (NIST) to develop a framework for reducing cyber risks to critical infrastructure.  And on February 12, 2014, NIST released the first version of the Framework for Improving Critical Infrastructure Cybersecurity. The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and…

Continue Reading

password-sos1

Windows 10’s Security Reboot, Part I: Authentication

There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos. He’s a security expert and had nothing but high praise for Microsoft’s security group. But he added their cutting-edge research doesn’t necessarily make it into…

Continue Reading

ponemon-report

Ponemon Study Shows Enterprise Data at Risk

What do over 2000 IT staff and end users have to say about internal security risks in their workplaces? A lot. For starters, over 75% say their organizations can’t track lost files or data, and 80% told us that a least-privilege model is not enforced! Find out the rest below in a Ponemon Study sponsored…

Continue Reading

How Varonis Helps With ITAR Compliance

International Traffic in Arms Regulations (ITAR) mandates that access to physical materials or technical data related to defense and military technologies is restricted to US citizens only. According to the US government, anything on the U.S. Munitions List falls under ITAR. Besides rocket launchers, torpedoes, and other military hardware, the list also restricts the plans, diagrams,…

Continue Reading

jim and barb

CRN Honors Varonis for Our Commitment to the Channel

I’m happy to report that today CRN magazine recognized Varonis for our commitment to driving channel partner success by naming me and Jim O’Boyle to its prestigious list of 2015 Channel Chiefs. It’s truly an honor for us to be listed amongst a group of channel executives selected by CRN’s editorial team who are being…

Continue Reading

iamyourcustomer

Timely Cybercrime Analysis from FINRA

Hackers stealing passwords, credit card and social security numbers, and health insurance IDs can lead to significant dollar losses. But let’s think the unthinkable: hackers getting access to our retirement, 401(k), and brokerage accounts. Of course, that’s where the real money is. The Financial Industry Regulatory Authority (FINRA), an independent watchdog group, recently published a…

Continue Reading