Protecting Bridget Jones’s Baby

miramax__120329094238

In the wake of the Sony Pictures breach, studios are getting much smarter when it comes to data protection. A shining example is Miramax, a global film and television studio best known for its award-winning and original content such as 2016’s Bridget Jones’s Baby with Universal Pictures and Studio Canal. Read the full case study ⟶ Miramax was […]

Continue Reading →

Data Privacy US-Style: Our National Privacy Research Strategy

usa-flag

While the EU has been speeding ahead with its own digital privacy laws, the US has been taking its own steps. Did you know there’s a National Privacy Research Strategy (NPRS) white paper that lays out plans for federally funded research projects into data privacy? Sure, the Federal Trade Commission has taken up the data privacy […]

Continue Reading →

Active Directory in Plain English

pexels-photo (8)

It is tough getting started with Active Directory. There are lots of reasons for this: the years of cruft, the inherent complexity, the intimidating raw power… and the fact that everything has about six different names. To help make sense of this, we’ve translated AD terms back into something a human might use when conversing […]

Continue Reading →

Enterprise Security Gaps: a Ponemon Institute Study

mind_the_gap

We recently sponsored a study about data protection and enterprise security with the Ponemon Research institute: Closing Security Gaps to Protect Corporate Data: A Study of U.S. and European Organizations. A primary focus was to research security gaps within organizations that lead to data breaches and ransomware attacks – what are the leading causes?  How […]

Continue Reading →

SQL Server Best Practices, Part II: Virtualized Environments

lion

It is 2016 and some people still think SQL Server cannot be run on a virtual machine. SQL Server can successfully run in a VM but SQL is resource-intensive by nature and so if you are going to virtualize SQL then you simply must adhere to best practices. Not following best practices can be the […]

Continue Reading →

One Take Away from Black Hat 2016: Designer Ransomware!

house-money-capitalism-fortune-12619

We had an amazing week at Black Hat 2016.  One topic that was on attendees’ minds— besides hacking Jeeps and chip-and-pin technology — was ransomware. A security analysis firm now warns us that ransomware has become more clickable because the thieves are localizing the phish mail. You should watch the video below for the full […]

Continue Reading →

The Best Ransomware Defense: Limiting File Access

pexels-photo-90099

If ransomware lands on your machine, but can’t find your files, are you really infected? This isn’t a philosophical thought experiment, I promise.  Let me explain. Keeping data off your endpoints A common paradigm in IT for many years has been to keep user data on network drives–departmental shares, home folders, etc. Not only do network […]

Continue Reading →

What is the Minimum Acceptable Risk Standards for Exchanges (MAR-E)?

Selfi-Mars

Under the Affordable Care Act (ACA) of 2010, there are now online marketplaces to buy health insurance. These are essentially websites that allow consumers to shop around for an insurance policy by comparing plans from different private providers. Result: US consumers can purchase health insurance using the same technology that allows them to buy books, […]

Continue Reading →

SQL Server Best Practices, Part I: Configuration

bear-brown-bear-animal-teddy-bear-46175

Am I the only one who finds the Microsoft SQL server best practice guides to be a little painful to trawl through? Somehow, I doubt it. After being frustrated reading numerous technical guides, best practice guides, TechNet articles, and blog posts written by SQL experts, I thought it would be helpful to compile a simple […]

Continue Reading →

5 Big Data Minds You Should Follow on Twitter

big-data-people

We’ve reached the point in big data’s innovation cycle where many of the barriers have been broken down and we are seeing some mind-blowing results—solutions that actually work and make businesses, and lives, substantially better. These brilliant minds are in the trenches, building self-repairing nano-circuits and tackling diseases. So, here’s my pick of 5 big data […]

Continue Reading →

Podcast Episode #15 – #TechFails

techfail

When technology doesn’t work when it should, is it a tech fail? Or perhaps because humans are creating the technology, fails should be more accurately called a human fail? In this episode, we discuss various types of “fails”, including the latest popular Pokémon Go, why we can’t vote online and the biggest fail of all, […]

Continue Reading →