Top Minds in PCI Compliance

In 2014, over one billion records were breached.1 Among those breached, retail and financial industries were hit the hardest.  With Home Depot’s data breach, attackers hijacked payment data systems and stole over 100 million records such as payment card information and other sensitive customer data.2 With 2014 billed as “The Year of the Data Breach,”…

Continue Reading


Enterprise Search: Connecting File Data and Knowledge, Part II

If you’re like me, you use the autosuggestion box in Google (or your favorite search engine) to quickly confirm or learn new facts even without having to see the search results. Not sure how to spell the name of that Seattle Seahawks running back? Start entering in the first few letters, “mars,” and Google provides…

Continue Reading

public-private cloud

Public Versus Private Cloud File Sharing: Pros and Cons

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same beginner’s confusion about cloud computing services, or Enterprise File Sync and Share (EFSS). Public Cloud One reason why consumer file sharing services like Dropbox have…

Continue Reading


Three Mistakes Not to Make When Choosing an Enterprise File Sync and Share Product

In recent years the user experience of file sharing products has improved tremendously. It’s rare these days to see people and companies struggling with FTP and weird proprietary methods of trying to handle common tasks like sharing a file. But a simplified user experience comes at a price. It can cause people to underestimate the…

Continue Reading

US Healthcare and Pharmaceutical Companies Are Vulnerable

A recent survey conducted by the Ponemon Institute suggests that more than half of U.S. healthcare and pharmaceutical employees believe that their organizations do not place a high priority on the protection of sensitive data. Commissioned by Varonis, the Ponemon survey looked at internal security risks as seen by IT employees. When examining the results…

Continue Reading


How Varonis Helps with the FDA

Title 21 Code of Federal Regulations (CFR) Part 11 regulates the United States’ Food and Drug Administration’s electronic records and signatures by outlining the criteria required to be considered trustworthy and reliable. Often referred to as Part 11, this regulation applies to electronic records that are created, modified, maintained, archived, retrieved, or transmitted. To learn…

Continue Reading


How to Detect Dropbox on Your Network

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list of increasingly serious complaints from their users: It was difficult to establish who owned which documents (an important issue when writing your dissertation). It was…

Continue Reading


Windows 10’s Security Reboot, Part II: More on Authentication

A good part of Windows 10’s security improvements center on basic changes to the way users and software prove their identities. No, that wasn’t a mistake in the last sentence. Software, like, people, also can have an identity and be required to show they’re the apps they say they are. The underlying technology is well…

Continue Reading


How Varonis Helps with NIST

In 2013 the President directed the National Institute of Standards and Technology (NIST) to develop a framework for reducing cyber risks to critical infrastructure.  And on February 12, 2014, NIST released the first version of the Framework for Improving Critical Infrastructure Cybersecurity. The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and…

Continue Reading


Windows 10’s Security Reboot, Part I: Authentication

There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos. He’s a security expert and had nothing but high praise for Microsoft’s security group. But he added their cutting-edge research doesn’t necessarily make it into…

Continue Reading