What you may have missed

What You May Have Missed

1. British Airways can now track your happiness level while you’re on board.  Fiber optics are woven into the blanket to measure electrical fluctuations in the brain. When your blanket turns red, it means you’re feeling anxious and when the blanket turns blue, it means you’re relaxed and happy.  And green means you’d like a…

Continue Reading

monkeys

The Security Chaos Monkey

Jon Oltsik wrote a great article in Network World recently championing the importance of end user involvement in a company’s IT security strategy.  He acknowledges that employees are often a company’s own worst enemy, frequently scorned by their IT overlords. But Olstik argues that CISOs should instead directly enlist them to help build a security-minded…

Continue Reading

da-chargeback

Usage-Based Storage Chargebacks with DatAdvantage

Usage-based chargebacks is just a better way to do cost sharing: it’s more fair, transparent, and consistent then other approaches.  If you want proof, read our IT Chargeback guide. What about actually doing chargebacks with data storage? Of course, the first step is getting a breakdown of data usage by cost centers or other group…

Continue Reading

What you may have missed

What You May Have Missed

1. When a cable operator retransmits local TV signals, it pay licensing fees to broadcasters. Aereo is a startup that streams local TV signals over the Internet by keeping individual antennas in the cloud for each of its users. This week the Supreme Court said Aereo is really a cable company and must therefore pay copyright…

Continue Reading

iron-safe

A Closer Look at Pass the Hash, Part II: Prevention

Last week, I attended a webinar that was intended to give IT attendees a snapshot of recent threats—a kind of hacker heads-up. For their representative case, the two sec gurus described a clever and very targeted phishing attack. It led to an APT being secretly deposited in a DLL. Once the hackers were in, I…

Continue Reading

395px-Automated_Storage_and_Retrieval_System_-_Defense_Visual_Information_Center_·_DD-ST-96-00253

Three Things to Be Aware of With Low-Cost Data Backup Services

I’m always a little surprised by the reaction from customers regarding off-site storage services.  It goes something like, “Well, the price is so good, that I don’t really need to know anything else.”  From a pure accounting standpoint, I do see their point. As a company goes down the road of evaluating low-cost backup and…

Continue Reading

Latest Varonis Survey Reveals the Speed Bumps to Ubiquitous Enterprise Search

We can’t imagine modern consumer life without search engines to help us find Web content that answers our most pressing questions. But in the business world, the situation is almost reversed—we’ve settled for pre-Internet era file search technology to locate the documents and information that help us do our jobs. In a Varonis survey of…

Continue Reading

What you may have missed

What You May Have Missed

1. The Department of Health and Human Services is hoping to send a firm message to the industry – be prepared for higher HIPAA fines if you don’t pass your audit! The Department of HHS’ Office of Civil Rights has received numerous security complaints about organizations that have failed to perform a comprehensive HIPAA-mandated risk…

Continue Reading

Whitepaper - The IT Chargebacks Guide

Varonis Guide to IT Chargebacks

If our posts on IT chargebacks had you asking more questions, then our new whitepaper should have the answers. The Varonis IT Chargeback Guide: How to Quantify IT’s Contribution to the Bottom Line discusses the most common chargeback methodologies to divide up IT costs among the various profit-making business units and the inherent problems with…

Continue Reading

800px-Tickets

A Closer Look at Pass the Hash, Part I

We’ve done a lot of blogging at the Metadata Era warning you about basic attacks against passwords. These can be mitigated by enforcing strong passwords, eliminating vendor defaults, and enabling reasonable lockout settings in Active Directory. But don’t rest yet! Hackers have another password trick that’s much more difficult to defend against. Advanced password, or…

Continue Reading