Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Data Security

Articles

What’s the Difference between Hacking and Phishing?

Because I’ve boldly assigned myself the task to explain hacking and phishing, I feel compelled to define both terms concisely because, as Einstein’s been quoted countless times, “If you can’t...

Read More

How to Configure Varonis and EMC Isilon

Customers of EMC’s popular Isilon storage platform have been clamoring for sophisticated controls around their sensitive, regulated content—e.g., SOX, PCI, intellectual property, etc.  Varonis is the perfect fit.  With our...

Read More

5 Privacy Concerns about Wearable Technology

With over 55 different fitness wearable devices to choose from, the wearables market has breathed new life into our personal health, providing us with more insight into our sleep patterns,...

Read More

Cryptography May Not Be Dead, But It Is on Life Support

Cindy and I had the good fortune of attending part of the Real World Cryptography Workshop held last week in New York City. We went primarily to listen to Bruce...

Read More

What is Human Generated Data?

Unlike business application data, like a billing database or CRM system, or machine-generated data, such as the log files that servers generate, human-generated data is comprised of the emails, Word...

Read More

New PII Discovered: License Plate Pictures

After finishing up some research on personally identifiable information I thought, mistakenly, that I was familiar with the most exotic forms of PII uncovered in recent years, including zip code-birth...

Read More

Red Alert: A Data Breach Report

Can you detect a data breach in real-time?  Most people can’t. Our new Red Alert Research Report, based on survey data from 248 information security professionals, indicates that only 6%...

Read More

Yet Another Reminder that Cybercrime Isn’t Going Away

Last week, PricewaterhouseCoopers released their 2013 US State of Cybercrime Survey. Coming on the heels of Verizon’s 2013 Data Breach Investigations Report, recent ID theft data from the FTC, and...

Read More

The Top 6 Exploits Used by Government Hackers

Yes, hackers can be spies. Stay calm, all the same rules still apply. Along with the rest of America, I read the headlines last week about the Chinese military hacking into US...

Read More

Personally Identifiable Information Hides in Dark Data

To my mind, HIPAA has the most sophisticated view of PII of all the US laws on the books. Their working definition encompasses vanilla identifiers: social security and credit card...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.