Brian Vecci
Brian Vecci is Varonis' Field CTO and joined the team as a technical evangelist in 2010. He helps protect teams from insider threats, cyberattacks, and terrible sales presentations.
-
AI Security
Apr 09, 2024
Ensuring Data Integrity in the Age of AI: How State and Local Governments Can Protect Their Data
Varonis Field CTO Brian Vecci sat down with StateTech to chat about enhancing digital integrity for state and local governments. Read the summary below or view the entire interview here.
Brian Vecci
4 min read
-
AI Security
Mar 15, 2024
6 Prompts You Don't Want Employees Putting in Copilot
Crowned the greatest productivity tool in the age of AI, Microsoft Copilot is a powerful asset for companies today.
Brian Vecci
3 min read
-
AI Security
Dec 12, 2023
Is Your Org Ready for Microsoft Copilot?
Microsoft Copilot is now available for enterprise customers, transforming productivity in the Microsoft 365 ecosystem. However, security and privacy concerns have companies hesitant to deploy Copilot. There are operational, regulatory, and reputational risks that every organization needs to overcome before they can leverage Copilot.
Brian Vecci
9 min read
-
Privacy & Compliance
May 22, 2023
Meta's $1.3B Fine: What can Happen if you Don’t Monitor Your PII
Sometimes when I speak with organizations about sensitive data risk, I hear things like, “All of our data is sensitive,” or “We’re sure PII is only in X system.” But it’s not what you know that might be your biggest problem — it’s always what you don’t know.
Brian Vecci
2 min read
-
Data Security
Apr 23, 2021
Permission Propagation: Info and Tips
Permission propagation is when you set permissions – also called Access Control Lists (ACL) – on a folder or a drive, and the folder properties apply those permissions to all of the folders under that folder in the tree.
Brian Vecci
4 min read
-
Security Bulletins
Jun 24, 2020
Getting the Most Out of Data Transport Engine
If you don’t need it, get rid of it. If it’s sensitive, make sure sure it’s in the right place, and only accessible to those who need it. Old files are expensive and risky, which is why we have retention and disposition policies for what should happen to data that we don’t need anymore.
Brian Vecci
3 min read
-
Data Security
Dec 11, 2012
Using Varonis: Who Owns What?
(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance. You can find the whole series here.)
Brian Vecci
3 min read
-
Data Security
Jun 05, 2012
SharePoint Permissions Cheat Sheet
Complexity is dangerous in the security world. The harder something is to understand, the harder it is to protect. SharePoint falls squarely into this category. Configuring permissions in SharePoint can be daunting, especially if you don’t understand the core concepts and terminology. Unfortunately, managing access controls in SharePoint is often left end-users, not IT administrators, and that can spell disaster.
Brian Vecci
2 min read
-
Data Security
Jan 06, 2012
Why Do SharePoint Permissions Cause So Much Trouble?
SharePoint permissions can be the stuff of nightmares. At Varonis, we get a chance to meet with a lot of SharePoint administrators and it’s rare that they’re not exhausted trying to manage user permissions. SharePoint’s a useful collaboration platform—and Microsoft’s fastest selling product ever—but helping to ensure proper permissions and access control is probably not its strongest suit.
Brian Vecci
2 min read
-
Data Security
Sep 24, 2011
Levels of Data Protection
Wednesday, I spoke at ISSA’s monthly chapter meeting in Colorado Springs. Speaking at ISSA chapter events is great, because it’s always an intelligent crowd that quickly grasps issues around data governance.
Brian Vecci
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital