Quantcast
Channel: c24 Application Hosting Specialists » Access control list
Browsing all 11 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Challenges of Metadata Collection

by Brian Vecci In my recent post, Improving Authorization with Metadata, we talked about what kinds of information we need in order to start cleaning up access control. This time I want to talk a...

View Article



Image may be NSFW.
Clik here to view.

Data Migration a Security Threat: Varonis

Image via CrunchBase Organizations are potentially exposing themselves to data breaches during migrations, and many don’t have confidence their data is secure, according to a Varonis survey.While 95...

View Article

Image may be NSFW.
Clik here to view.

12 Tips to Prevent your Sensitive Data Becoming a Wikileaks Headline

By David Ricketts Head of Marketing C24   Recent worldwide controversies surrounding confidential material being supplied to unauthorized people and sites such as Wiki Leaks by anonymous...

View Article

Image may be NSFW.
Clik here to view.

Using Varonis: Fixing the Biggest Problems

Now that we have a pretty good idea where the highest-risk data is, the question naturally turns to reducing that risk. Fixing permissions problems on Windows, SharePoint or Exchange has always been a...

View Article

Image may be NSFW.
Clik here to view.

7 Recommendations for Data Protection by Forrester’s Andras Cser

by David Gibson Last week Varonis hosted a webinar on using strong identify context to help protect data, where I was joined by Andras Cser of Forrester. Andras shared really interesting insights on...

View Article


Image may be NSFW.
Clik here to view.

Top 5 Things IT Should Be Doing, But Isn’t

Posted on December 5, 2012 by Brian Vecci A clear path to effective information governance. 1. Audit Data Access Effective management of any data set is impossible without a record of access. Unless...

View Article

Image may be NSFW.
Clik here to view.

Using Varonis: Who Owns What?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) All organizational data needs an owner. It’s that...

View Article

Image may be NSFW.
Clik here to view.

Top 3 SharePoint Security Challenges

The rapid adoption of SharePoint has outpaced the ability of organizations to control its growth and enforce consistent policies for security and access control. The ease with which SharePoint sites...

View Article


Image may be NSFW.
Clik here to view.

Determining the Root Cause of a Data Breach With “The 5 Whys”

The jarring sound of an iPhone vibrating against a mahogany nightstand at 3:15am.  This can’t be good.  Server down?  Much worse: 50,000 sensitive files have been stolen from a poorly permissioned file...

View Article


Image may be NSFW.
Clik here to view.

Determining the Root Cause of a Data Breach With “The 5 Whys”

The jarring sound of an iPhone vibrating against a mahogany nightstand at 3:15am.  This can’t be good.  Server down?  Much worse: 50,000 sensitive files have been stolen from a poorly permissioned file...

View Article

Image may be NSFW.
Clik here to view.

The Value of Sandboxes

Posted on September 23, 2013 by Rob Sobers There’s been a lot of talk about malware sandboxing as a form of protection against advanced persistent threats (APTs). The idea behind malware sandboxing is...

View Article
Browsing all 11 articles
Browse latest View live




Latest Images