Blog

Data Security

Windows 10’s Security Reboot, Part III: FIDO and Beyond

Michael Buckbee

Michael Buckbee

FIDO’s Universal Two Factor (U2F) is intended to make it easy for companies to add a strong second factor to their existing crypto infrastructure. Most of us are probably not...

Interview With Alexandra Ross, The Privacy Guru

Michael Buckbee

Michael Buckbee

Alexandra Ross is not your ordinary attorney practicing privacy law. Her CV includes a stint as Associate General Counsel for Wal-Mart Stores, where she built this giant retailer’s privacy policies...

Public Versus Private Cloud File Sharing: Pros and Cons

Michael Buckbee

Michael Buckbee

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same...

How to Detect Dropbox on Your Network

Michael Buckbee

Michael Buckbee

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list...

Windows 10’s Security Reboot, Part I: Authentication

Michael Buckbee

Michael Buckbee

There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos....

How to Detect and Clean CryptoLocker Infections

David Gibson

David Gibson

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops...

Someone Deleted My File. How Can I Find Out Who?

Michael Buckbee

Michael Buckbee

If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you...

Going Back To SQL Server 2008 In Order To Move Ahead

Michael Buckbee

Michael Buckbee

Last year, Microsoft ended its support for SQL 2008/R2. Customers with an enterprise agreement are still supported, but it’s a good idea to start planning your upgrade. Upgrading your production...

PCI DSS Explained: Our New White Paper Decodes the Complexity

David Gibson

David Gibson

The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide...

The Journey to File Permission Perfection  

Michael Buckbee

Michael Buckbee

More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS,...

Interview With NYU-Poly’s Professor Justin Cappos: Security Lessons From Retail Breaches

Michael Buckbee

Michael Buckbee

I had the chance to talk with cyber security expert Justin Cappos last month about the recent breaches in the retail sector. Cappos is an Assistant Professor of Computer Science...

Microsoft Fixes A Kerberos Silver Ticket Vulnerability

Michael Buckbee

Michael Buckbee

Note: This post has created a bit of controversy among the security illuminati! A post on Still Passing the Hash Blog 15 Years Later explains the issues. I think a...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.