forbes

Forbes: Do You Know Where Your Data Is And Who Reads It? Varonis Knows

Gil Press, Forbes contributor, wrote a fantastic piece on Varonis.  My favorite part of the article: More often than not, the exposure of sensitive information to unauthorized insiders and outsiders is simply inadvertent. Gibson told me about a casino where the first line of the Varonis risk management report revealed that 15 million credit card…

Continue Reading

5 Big Data Minds You Should Follow on Twitter

We’ve reached the point in big data’s innovation cycle where many of the barriers have been broken down and we are seeing some mind-blowing results—solutions that actually work and make businesses, and lives, substantially better. I could point you to a research paper or two, but in my opinion, there’s no better way to insert…

Continue Reading

Should US Companies Pack Their Bags for Foreign Data Centers?

As a result of the recent NSA revelations, US cloud providers may lose tens of billions of dollars in revenue over the next few years. At least that’s the prediction made by two market analyst firms. Basing their numbers on a survey of executives from the Cloud Security Alliance, analysts guesstimated that foreign (mostly EU)…

Continue Reading

West Coast Files: California Breach Law to Cover More PII

With its updated breach notification law, will California be adding another national trend to its already impressive record? Super highways, private space travel, and now advanced notions on identity. Last month, Governor Brown signed a bill to amend the definition of personally identifiable information or PII in its existing notification law to include email addresses…

Continue Reading

CloudPro: Are NDAs the Missing Link in Cloud Security?

Davey Winder of CloudPro wrote a nice piece this week which builds on one of the key findings from our most recent Information Entropy report, in which we discovered that 44% of respondents claim to have not signed an NDA with their employer.  Winder’s main point is that the NDA could be a critical missing…

Continue Reading

5 Step SharePoint Migration Plan

Creating SharePoint sites and libraries is pretty simple. Getting the right data to those sites and libraries isn’t that simple, especially if you want to make sure that only the right people have access once it’s there and that data currently lives in file shares and/or in other domains. Which data do you move? What…

Continue Reading

Phishing Lessons: Care to phish your file system?

As I’ve been pointing out over many posts, hackers are generally not using very sophisticated techniques to break into corporate servers. Weak passwords vulnerable to brute-force guessing, or back-doors that were never removed from purchased software provide simple attack vectors. Could there be anything simpler? In fact, there is: how about just asking employees for…

Continue Reading

What is Human Generated Data?

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word documents, spreadsheets, presentations, images, audio, and video files that we create and share with other people every day. There is massive explosion of human generated…

Continue Reading