The Challenges of Metadata Collection
by Brian Vecci In my recent post, Improving Authorization with Metadata, we talked about what kinds of information we need in order to start cleaning up access control. This time I want to talk a...
View ArticleData Migration a Security Threat: Varonis
Image via CrunchBase Organizations are potentially exposing themselves to data breaches during migrations, and many don’t have confidence their data is secure, according to a Varonis survey.While 95...
View Article12 Tips to Prevent your Sensitive Data Becoming a Wikileaks Headline
By David Ricketts Head of Marketing C24 Recent worldwide controversies surrounding confidential material being supplied to unauthorized people and sites such as Wiki Leaks by anonymous...
View ArticleUsing Varonis: Fixing the Biggest Problems
Now that we have a pretty good idea where the highest-risk data is, the question naturally turns to reducing that risk. Fixing permissions problems on Windows, SharePoint or Exchange has always been a...
View Article7 Recommendations for Data Protection by Forrester’s Andras Cser
by David Gibson Last week Varonis hosted a webinar on using strong identify context to help protect data, where I was joined by Andras Cser of Forrester. Andras shared really interesting insights on...
View ArticleTop 5 Things IT Should Be Doing, But Isn’t
Posted on December 5, 2012 by Brian Vecci A clear path to effective information governance. 1. Audit Data Access Effective management of any data set is impossible without a record of access. Unless...
View ArticleUsing Varonis: Who Owns What?
(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance. You can find the whole series here.) All organizational data needs an owner. It’s that...
View ArticleTop 3 SharePoint Security Challenges
The rapid adoption of SharePoint has outpaced the ability of organizations to control its growth and enforce consistent policies for security and access control. The ease with which SharePoint sites...
View ArticleDetermining the Root Cause of a Data Breach With “The 5 Whys”
The jarring sound of an iPhone vibrating against a mahogany nightstand at 3:15am. This can’t be good. Server down? Much worse: 50,000 sensitive files have been stolen from a poorly permissioned file...
View ArticleDetermining the Root Cause of a Data Breach With “The 5 Whys”
The jarring sound of an iPhone vibrating against a mahogany nightstand at 3:15am. This can’t be good. Server down? Much worse: 50,000 sensitive files have been stolen from a poorly permissioned file...
View ArticleThe Value of Sandboxes
Posted on September 23, 2013 by Rob Sobers There’s been a lot of talk about malware sandboxing as a form of protection against advanced persistent threats (APTs). The idea behind malware sandboxing is...
View Article
More Pages to Explore .....