Data Security
What is User Behavior Analytics?
Jul 21, 2015
There’s nothing new in using analytics in data protection or breach prevention. Firewalls, for example, analyze packet contents and other metadata, such as IP addresses, to detect and block attackers...
How Varonis Helps with PCI DSS 3.1
Jun 26, 2015
The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how organizations manage credit card and other cardholder data. Many security professionals advocate that...
How to Create a Good Security Policy
May 06, 2015
CIOs have taken note of the nightmarish scenarios data breaches can bring – remember Sony and Target? To combat this ticking time bomb, they’ve beefed up their security budgets. The Computer...
SSL and TLS 1.0 No Longer Acceptable for PCI Compliance
May 06, 2015
The PCI Council released version 3.1 of their Data Security Standard (DSS), stating that SSL and TLS 1.0 can no longer be used after June 30, 2016.
Seven Free Data Wrangling Tools
Apr 22, 2015
Reformatting, de-duping, merging, and filtering are just some of the functions that go under the broad category of data wrangling. It’s all the scrubbing and cleaning that data scientists apply...
Privacy by Design Cheat Sheet
Mar 26, 2015
Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high...
Windows 10’s Security Reboot, Part III: FIDO and Beyond
Mar 16, 2015
FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not...
Interview With Alexandra Ross, The Privacy Guru
Mar 11, 2015
Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies...
Public Versus Private Cloud File Sharing: Pros and Cons
Mar 06, 2015
In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same...
How to Detect Dropbox on Your Network
Mar 03, 2015
The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list...
Windows 10’s Security Reboot, Part I: Authentication
Feb 26, 2015
There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos....
How to Detect and Clean CryptoLocker Infections
Feb 13, 2015
CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops...
Try Varonis free.
Deploys in minutes.