Blog

Data Security

A Closer Look at Pass the Hash, Part I

Michael Buckbee

Michael Buckbee

We’ve done a lot of blogging at the Metadata Era warning you about basic attacks against passwords. These can be mitigated by enforcing strong passwords, eliminating vendor defaults, and enabling...

What’s the Difference between Hacking and Phishing?

Michael Buckbee

Michael Buckbee

Because I’ve boldly assigned myself the task to explain hacking and phishing, I feel compelled to define both terms concisely because, as Einstein’s been quoted countless times, “If you can’t...

How to Configure Varonis and EMC Isilon

Rob Sobers

Rob Sobers

Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc.  Varonis is the perfect fit.  With our...

5 Privacy Concerns about Wearable Technology

Michael Buckbee

Michael Buckbee

With over 55 different fitness wearable devices to choose from, the wearables market has breathed new life into our personal health, providing us with more insight into our sleep patterns,...

Automate Exchange Distribution List Management

Michael Buckbee

Michael Buckbee

From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating...

CIFS vs SMB: What's the Difference?

Rob Sobers

Rob Sobers

CIFS, SMB, Samba, and NFS are technolgies used to network client and server systems. Learn the difference between them and which to use when.

Cryptography May Not Be Dead, But It Is on Life Support

Michael Buckbee

Michael Buckbee

Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce...

Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data

David Gibson

David Gibson

In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control...

How to Do Data Classification at Scale

Michael Buckbee

Michael Buckbee

One of the important points we make in our recently published Information Entr opy report is that you can’t just decide you have intellectual property, issue NDAs to employees, and...

8 Things to Look for in File Auditing Software

Rob Sobers

Rob Sobers

Here is a list of 8 critical factors IT pros should consider when evaluating file auditing software.

What is Human Generated Data?

Rob Sobers

Rob Sobers

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

The Dangers of Shared Links

Rob Sobers

Rob Sobers

Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs.  These URLs, often called “external links” or “shared links,” are a...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.