Varonis Data Governance Suite 5.9 is now GA

Data Governance Suite 5.9 is packed with new features, including DatAlert, which provides real-time alerts and data breach detection for file servers, NAS, Exchange, and SharePoint.

Continue Reading

767px-Siege_orleans

2014 Verizon DBIR: Year of Living Dangerously

One of the sure signs of spring, besides tulips and daffodils, is the release of the 2014 Verizon Data Breach Investigations Report. For those who are excited by survey methodology, this year’s report marks a dramatic change for the DBIR. They’re no longer sticklers about verifying breaches leading to actual data exposures, which limited the…

Continue Reading

Low_hanging_fruit_(grapes)

Insights from the SANS Survey on Event Logging

SANS Critical Security Controls (CSC) have been getting more attention over the last few years. As security experts come around to focusing on the actual techniques used by hackers, the SANS “offense informs defense” approach is resonating. And now with the 2014 Verizon Data Breach Investigations Report (DBIR), it has received a new and important endorsement….

Continue Reading

what you may have missed

What you may have missed

1. An awesome graphic of Heartbleed and security, depicting how the vulnerability works and a way to flag sites vulnerable to Heartbleed. 2. Despite the powers of big data, there are a few shortcomings that limit the accuracy for predicting flu epidemics. 3. Healthcare conference attendees believe privacy will crash big data if we don’t get it right. 4. Government public service…

Continue Reading

Cliff_diver

Enterprise Search: Diving into the Index, Part I

In my posts on enterprise search, I talked about some of the higher-level issues in turning classic web-based search into a product for the business space. To summarize, while enterprise search isn’t like the World Wide Web, it is still a Big Data problem. Just as with web search, it requires metadata—in this case, file…

Continue Reading

How to Configure Varonis and EMC Isilon

Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc.  Varonis is the perfect fit.  With our new integration, EMC Isilon customers can audit, manage and protect their human-generated data. David Gibson sits down with Vinod Muralidhar from EMC Isilon and Henry…

Continue Reading

what you may have missed

What you may have missed

1. The FTC can now sue companies with loose security controls that result in a data breach if the company claims that consumer data is secure. No way! Yes way.  The U.S. District Court for the District Court of New Jersey upheld the FTC’s authority to regulate data security under the unfair or deceptive provisions of the…

Continue Reading

Dials_(10635423343)

More on Chargebacks: Easing Towards Usage-based Storage Costs

Chargebacks have always been a contentious part of corporate life. It’s not that managers aren’t accustomed to working within budgets and approving invoices for outside vendors. But paying for an internal service?  A typical line of business manager’s reaction is that chargebacks amount to a ‘bunch of bean counting’ that serves no useful purpose. But…

Continue Reading

AD domain naming

Active Directory Domain Naming Best Practices

When you’re naming domains, it should be planned as carefully as you would in naming your first child – of course I’m exaggerating – but it’s worth planning carefully.  For those of you who fail to heed this advice, we’ll be writing a tutorial on how to rename a domain shortly. Before we discuss current…

Continue Reading