Data Security
A Closer Look at Pass the Hash, Part I
Jun 17, 2014
We’ve done a lot of blogging at the Metadata Era warning you about basic attacks against passwords. These can be mitigated by enforcing strong passwords, eliminating vendor defaults, and enabling...
What’s the Difference between Hacking and Phishing?
May 21, 2014
Because I’ve boldly assigned myself the task to explain hacking and phishing, I feel compelled to define both terms concisely because, as Einstein’s been quoted countless times, “If you can’t...
How to Configure Varonis and EMC Isilon
Apr 21, 2014
Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc. Varonis is the perfect fit. With our...
5 Privacy Concerns about Wearable Technology
Mar 11, 2014
With over 55 different fitness wearable devices to choose from, the wearables market has breathed new life into our personal health, providing us with more insight into our sleep patterns,...
Automate Exchange Distribution List Management
Mar 05, 2014
From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating...
CIFS vs SMB: What's the Difference?
Feb 14, 2014
CIFS, SMB, Samba, and NFS are technolgies used to network client and server systems. Learn the difference between them and which to use when.
Cryptography May Not Be Dead, But It Is on Life Support
Jan 21, 2014
Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce...
Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data
Dec 23, 2013
In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control...
How to Do Data Classification at Scale
Nov 07, 2013
One of the important points we make in our recently published Information Entr opy report is that you can’t just decide you have intellectual property, issue NDAs to employees, and...
8 Things to Look for in File Auditing Software
Oct 03, 2013
Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.
What is Human Generated Data?
Sep 30, 2013
Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...
The Dangers of Shared Links
Jun 11, 2013
Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs. These URLs, often called “external links” or “shared links,” are a...
Try Varonis free.
Deploys in minutes.