Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Rob Sobers

What is Human Generated Data?

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

Read More

Real-time Alerting and Monitoring with Varonis DatAlert

Today we’re happy to announce Varonis Data Governance Suite 5.9 beta, which includes the launch of Varonis DatAlert.  DatAlert improves your ability to detect possible security breaches, misconfigurations, and other...

Read More

What is HIPAA and why should I care?

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996, which requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health...

Read More

Red Alert: A Data Breach Report

Can you detect a data breach in real-time?  Most people can’t. Our new Red Alert Research Report, based on survey data from 248 information security professionals, indicates that only 6%...

Read More

The Dangers of Shared Links

Many web applications give users the ability to share private information with unauthenticated users via obscure, publicly accessible URLs.  These URLs, often called “external links” or “shared links,” are a...

Read More

New Zealand’s Leaky Servers Highlight the Need for Information Governance

How a Permissions Report Could Have Plugged the Hole in New Zealand’s Leaky Servers Earlier this week, Keith Ng blogged about a massive security hole in the New Zealand Ministry of...

Read More

The Definitive Guide to Cryptographic Hash Functions (Part II)

Last time I talked about how cryptographic hash functions are used to scramble passwords.  I also stressed why it is extremely important to not be able to take a hash...

Read More

Lessons Learned from Mat Honan’s Epic Hacking

” Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.” If you haven’t read Gizmodo writer Mat Honan’s...

Read More

The Definitive Guide to Cryptographic Hash Functions (Part 1)

Give me any message and I will create a secret code to obscure it. Try it! Try another one. This is called hashing—a technique often used to secure passwords (among...

Read More

Marco Arment on Dropbox: Don’t use it for anything valuable

If you haven’t heard of Marco Arment–creator of Instapaper, co-founder of Tumblr, and Internet-famous software developer–go follow him on Twitter…now. Not only is Marco an amazingly successful entrepreneur, but his...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.