Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Rob Sobers

3 Deadly File Permissions Mistakes

Scarily, in most organizations people have access to much more information than they need in order to do their jobs.  With file permissions, it’s easy to mess things up and...

Read More

How to Configure Varonis and EMC Isilon

Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc.  Varonis is the perfect fit.  With our...

Read More

CIFS vs SMB: What’s the Difference?

I’ve received quite a few questions from both new and experienced sysadmins about networked filesystems and file sharing protocols. One question that comes up frequently is “What is the difference between...

Read More

8 Things to Look for in File Auditing Software

Any seasoned IT pro will tell you: auditing file and email activity is hard.  You’ve got a production Exchange or SharePoint server being pounded on relentlessly by users all day...

Read More

What is Human Generated Data?

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

Read More

Real-time Alerting and Monitoring with Varonis DatAlert

Today we’re happy to announce Varonis Data Governance Suite 5.9 beta, which includes the launch of Varonis DatAlert.  DatAlert improves your ability to detect possible security breaches, misconfigurations, and other...

Read More

What is HIPAA and why should I care?

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996, which requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health...

Read More

Red Alert: A Data Breach Report

Can you detect a data breach in real-time?  Most people can’t. Our new Red Alert Research Report, based on survey data from 248 information security professionals, indicates that only 6%...

Read More

The Dangers of Shared Links

Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs.  These URLs, often called “external links” or “shared links,” are a...

Read More

New Zealand’s Leaky Servers Highlight the Need for Information Governance

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers Earlier this week, Keith Ng blogged about a massive security hole in the New Zealand Ministry of...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.