Attorney and Data Scientist Bennett Borden, Part II [PODCAST]

Bennett-Borden--1

In this second podcast, Bennett continues where he left off last time. Borden describes his work on developing algorithms to find insider threats based on analyzing content and metadata.

Continue Reading →

If the GDPR Were in Effect, Yahoo Would Have to Write a Large Check

money-finance-bills-bank-notes-2

Meanwhile back in the EU, two data protection authorities have announced they’ll be looking into Yahoo’s breach-acopalypse. Calling the scale of the attack “staggering”, the UK’s Information Commissioner’s Office (ICO) has signaled they’ll be conducting an investigation.  By the way, the ICO rarely comments this way on an on-going security event. In Ireland, where Yahoo […]

Continue Reading →

Yahoo Breach: Pros react to massive breach impacting hundreds of millions of users

Yahoo has confirmed a data breach affecting at least 500 million users in the latest mega breach to make headlines. Here’s what some infosec pros had to say about it. If Yahoo waited ~2mo to inform Verizon of the breach, that says interesting things about the acquisition negotiations during that period. — Jeremiah Grossman (@jeremiahg) September […]

Continue Reading →

Attraction of Repulsion (to Ransomware) – IOSS 23

potatoes-french-mourning-funny-162971

When it comes to ransomware, we can’t stop talking about it. There’s a wonderful phrase for our syndrome, “the attraction of repulsion,” meaning that something is so awful you can’t stop watching and/or talking about it. How awful has ransomware been? According to the FBI, in the first three months of 2016, ransomware attacks cost their […]

Continue Reading →

Genesis Financial Solutions Takes Proactive Approach to Protect their Data

blog_graphic_genesis

Genesis Financial Solutions is a financial institution, lender and America’s largest source of second-look financing. They really understand how important it is to keep their data secure from insider threats and cyberattacks. They were seeking a solution that would give them insight into their sensitive data and improve the effectiveness of their regulatory compliance. With […]

Continue Reading →

Interview with Attorneys Bret Cohen and Sian Rudgard, Hogan Lovells’ GDPR Experts

bret-and-sian-hl

We are very thankful that Bret Cohen and Sian Rudgard took some time out of their busy schedules at the international law firm of Hogan Lovells to answer this humble blogger’s questions on the EU General Data Protection Regulation (GDPR). Thanks Bret and Sian! Bret writes regularly on GDPR for HL’s Chronicle of Data Protection blog, […]

Continue Reading →

Statistician Kaiser Fung: Fishy Stats [PODCAST, Part Three]

fung-book

Over the past few weeks, Kaiser Fung has given us some valuable pointers on understanding the big data stats we are assaulted with on a daily basis.  To sum up, learn the context behind the stats — sources and biases — and know that the algorithms that crunch numbers may not have the answer to your […]

Continue Reading →

Why the OPM Breach Report is a call-to-action for CSOs to embrace data-centric security

The Committee on Oversight and Government Reform released a fascinating 231-page report detailing the how and why behind the epic breach at the United States Office of Personnel Management. Richard Spires, the former CIO of the IRS and DHS, remarked on OPM’s failure to take a data-centric approach to information security: “[I]f I had walked […]

Continue Reading →

The difference between SSL and TLS

Image credit: zviray

Image credit: zviray The chronic epidemic of face blindness that affects the population of Metropolis and prevents them from realizing that Clark Kent and the freaking flying alien who looks just like him are actually the same person extends to the tech sector where we continually argue over how pedantic to be about the difference […]

Continue Reading →

Statistician Kaiser Fung: Accuracy of Algorithms [PODCAST, Part Two]

fung-book

In part one of our interview with Kaiser, he taught us the importance of looking at the process behind a numerical finding. We continue the conversation by discussing the accuracy of statistics and algorithms. With examples such as shoe recommendations and movie ratings, you’ll learn where algorithms fall short.

Continue Reading →

I’m Jim Graham, Manager of Sales Engineering at Varonis, and This is How I Work

jim_graham

This quarter we will be getting to know Jim Graham, a Manager of Sales Engineering at Varonis, who manages employees located in California, Nevada, Arizona, New Mexico, and Hawaii. According to his manager Scott Truchot: Jim is well liked by his coworkers and there to provide a helping hand when needed, and his happy demeanor […]

Continue Reading →