Top #InfoSec People to Follow on Twitter

follow

When it comes to #infosec people, we often think of brand names like @briankrebs, @schneierblog, @troyhunt, and @anton_chuvakin. But let’s not ignore other remarkable #infosec pros who are working tirelessly to improve our security and privacy. Follow these top #infosec people on Twitter, so you can hear what they have to say! Christina Ayiotis @christinayiotis Christina Ayiotis […]

Continue Reading →

The Difference Between Active Directory and LDAP

Active Directory (AD) is a directory service made by Microsoft. It provides all sorts of functionality like authentication, group and user management, policy administration and more. LDAP is a way of speaking to Active Directory. LDAP, which stands for Lightweight Directory Access Protocol, is a means for querying items in any directory service that supports […]

Continue Reading →

Podcast Episode #13 – GDPR

gdpr

We’ve been writing about the GDPR for the past few months now and with the GDPR recently passed into law, we thought it was worth bringing together a panel to discuss its implications. In this episode of the Inside Out Security Show, we discuss how the GDPR will impact businesses, Brexit, first steps you should […]

Continue Reading →

Podcast Episode #12 – The Password is Dying

password

In our last Inside Out Security show – Everything You Need to Know About Passwords – we covered hashes, salting your hash, and creating passwords. However, there are shortcomings to password-based authentication – brute force attacks, passwords stored as plain text, weak passwords, and more! Luckily, as of late, banks and technology companies are exploring really exciting alternatives […]

Continue Reading →

EU GDPR Controversies [INFOGRAPHIC]

gdpr_infographic1

The General Data Protection Regulation (GDPR) took years to become law as the relevant parties engaged in endless rounds of negotiations. It’s not surprising that there are some controversial elements. Time for another GDPR infographic! We’ve boiled down the controversies into three areas: territorial scope, right to be forgotten, and steep fines. Large US and other […]

Continue Reading →

EU GDPR: Data Rights and Security Obligations [INFOGRAPHIC]

license

The EU General Data Protection Regulation (GDPR) isn’t light reading. However, it doesn’t mean that this law’s essential ideas can’t be compressed and rendered into a highly informative infographic. We’ve been spending the last few months untangling the legalese and looking for ways to simplify the GDPR’s key requirements. One way to view the new […]

Continue Reading →

FYI: EU Network and Information Security Directive

twilight-power-lines-evening-evening-sun-46169

While we’ve been focusing on the EU General Data Protection Regulation (GDPR), there’s another EU security initiative that deserves an honorable mention. First proposed in 2013, the Network and Information Security Directive  (NISD) addresses cybersecurity for “essential services”. The NIS Directive is not nearly as detailed as the GDPR. Its goal is to improve co-operation […]

Continue Reading →

The Essential Guide to Identifying Your Organization’s Most Sensitive Content

identify

What do hackers want? If you answered money — always a safe bet — then you’d be right. According to the Verizon Data Breach Investigations Report (DBIR), financial gain still is the motivation for over 75% of incidents it had investigated. A better answer to the above question is that hackers want data — either monetizeable […]

Continue Reading →

6.2.51 (including DLX) is now GA

lighthouse

We’re excited to announce the GA release of 6.2.51: this release includes a range of enhancements focusing on data security, new integrations, and a more intuitive user interface. Some of the highlights that are now generally available include: New DatAlert Threat Models: Get inside-out security with sophisticated threat models built on advanced analytics, user behavior, […]

Continue Reading →

[Infographic] Varonis Behind the Scenes

varonis-at-work

With 32 patents issued and 108 patent applications worldwide, we’ve been working hard to help you protect your organization’s data from insider threats and cyberattacks. To get a better idea of what’s happening behind the scenes, we thought it might help to see a few stats. The People Behind the Software We currently have 989 […]

Continue Reading →

After-the-Breach Advice: A Legal Eagle View

pexels-photo (7)

One surprising fact about breach responses at large companies is that IT may not be leading the charge. A few months ago, I was at a legal technology conference in which panelists said the chief legal officers or chief privacy officers manage cyber-incident responses. IT is involved, they noted, but usually in a supporting role. […]

Continue Reading →