Why the OPM Breach Report is a call-to-action for CSOs to embrace data-centric security

The Committee on Oversight and Government Reform released a fascinating 231-page report detailing the how and why behind the epic breach at the United States Office of Personnel Management. Richard Spires, the former CIO of the IRS and DHS, remarked on OPM’s failure to take a data-centric approach to information security: “[I]f I had walked […]

Continue Reading →

The difference between SSL and TLS

Image credit: zviray

Image credit: zviray The chronic epidemic of face blindness that affects the population of Metropolis and prevents them from realizing that Clark Kent and the freaking flying alien who looks just like him are actually the same person extends to the tech sector where we continually argue over how pedantic to be about the difference […]

Continue Reading →

Statistician Kaiser Fung: Accuracy of Algorithms (Part 2)


In part one of our interview with Kaiser, he taught us the importance of looking at the process behind a numerical finding. We continue the conversation by discussing the accuracy of statistics and algorithms. With examples such as shoe recommendations and movie ratings, you’ll learn where algorithms fall short.

Continue Reading →

I’m Jim Graham, Manager of Sales Engineering at Varonis, and This is How I Work


This quarter we will be getting to know Jim Graham, a Manager of Sales Engineering at Varonis, who manages employees located in California, Nevada, Arizona, New Mexico, and Hawaii. According to his manager Scott Truchot: Jim is well liked by his coworkers and there to provide a helping hand when needed, and his happy demeanor […]

Continue Reading →

Attorney and Data Scientist Bennett Borden: Data Analysis Techniques (Part 1)


Once we heard Bennett Borden, a partner at the Washington law firm of DrinkerBiddle, speak at the CDO Summit about data science, privacy, and metadata, we knew we had to reengage him to continue the conversation. His bio is quite interesting: in addition to being a litigator, he’s also a data scientist. He’s a sought after speaker on […]

Continue Reading →

The difference between Bash and Powershell


You don’t normally talk philosophy and IT when considering Bash and Powershell, but if it’s one thing I’ve learned over the past 20 years of sysadmin work it’s that whether you’re an Empiricist, Nihilist or Young Hegeliansist, if you’re serious about doing your job you don’t spend your day clicking on buttons, you run your […]

Continue Reading →

Chief Data Officer Richard Wendell: Skills to Cultivate (Part 2)


In this second podcast, Mr. Wendell continues where he left off last time. He explains the skills you’ll need in order to be an effective Chief Data Officer and we learn more about MIT’s International Society of Chief Data Officers.

Continue Reading →

Bring Your Geek To Court – IOSS 22

law boosk

Last week, Alpesh Shah of Presidio joined us to discuss law firms and technology. With big data, ediscovery, the cloud and more, it’s of growing importance that law firms leverage technology so that they can better serve their clients. And in doing so, law firms can spend more time doing “lawyerly things” and, um, more billing. Hallmarks […]

Continue Reading →

Hugh Chatham Memorial Hospital Improves Their Data Security Posture with Varonis


With more than a terabyte of network file shares to clean up, Hugh Chatham Memorial Hospital enlisted Varonis to help them protect against data breaches, increase security, and to prevent ransomware. Not only did the hospital’s overall security posture improve with the implementation of the Data Classification Framework, DatAdvantage for Exchange and Windows, and DatAlert, […]

Continue Reading →

Statistician Kaiser Fung: Investigate The Process Behind A Numerical Finding (Part 1)


In the business world, if we’re looking for actionable insights, many think it’s found using an algorithm. However, statistician Kaiser Fung disagrees. With degrees in engineering, statistics, and an MBA from Harvard, Fung believes that both algorithms and humans are needed, as the sum is greater than its individual parts. Moreover, the worldview he suggests one should cultivate is […]

Continue Reading →

The Vulnerability of Things – IOSS 21

Keys and lock the door on the background of solar garden

We were thrilled when Pen Testing veteran, Ken Munro joined our show to discuss the vulnerabilities of things. In this episode, Ken reveals the potential security risks in a multitude of IoT devices – cars, thermostats, kettle and more. We also covered GDPR, Privacy by Design and asked if Ken thinks “The Year of Vulnerabilities” will be hitting […]

Continue Reading →