What You May Have Missed

1. Here’s an interesting perspective from a CTO on why metadata matters. 2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect...
Michael Buckbee
1 min read
Last updated January 17, 2023

1. Here’s an interesting perspective from a CTO on why metadata matters.

2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect student data and their privacy. Major protections of SB 1177 include prohibiting any website or mobile app from targeted advertising to K-12 students, their parents or legal guardians. The bill would also prohibit the sale and unauthorized access of student information. Meanwhile, AB 1584 deals with contracts between local educational agencies and third-party technology vendors. Once these two bills are signed into law, it would address a growing problem of mismanagement of student data and their privacy.

3. Earlier this week, the FTC held another Big Data workshop to continue its discussion on consumer privacy, “Big Data: A Tool for Inclusion or Exclusion?” Three major challenges that set the framework for theday-long workshop were: biased scores derived from credit reports, the unregulated world of data brokers and companies’ use of their own data about their customers. Solutions such as transparency and accountability were reiterated throughout the workshop.

4. The Data-Driven Marketing Institute reported that our “digital footprint” – which is comprised of data that we leave behind on a daily basis such as our location coordinates, time entered and exited a store, when a credit card is swiped, or an itemized list of things purchased – generated $156 billion dollars1 in 2012. This impressive figure is only just the beginning. As digital marketing becomes even more prevalent, organizations will soon be able to collect more data to develop a 360 degree view of customers’ thoughts and desires. As consumers contribute to this multi-billion dollar data industry, a question that’s coming up more often is, will we be compensated?

5. Privacy advocates have taken note of new features Apple has added in iOS 8. Under this version of the operating system that was just released on September 17, all personal data—photos, messages, contacts, email, call history –are encrypted by the device passcode. Previously, the key was maintained by Apple, thereby forcing the company to hand over passcodes when faced with law enforcement requests.  Under the new scheme, Apple can’t honor court warrants since it is unable to bypass the passcode. Apple has added two-factor authentication to its iCloud storage service, as well as an “always on” VPN feature.

 

 

 

 


  1. [1] http://ddminstitute.thedma.org/files/2014/06/DDMI-Webinar-Value-of-Data-Study-2013.10.17-FINAL.pdf

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

varonis-version-8.5:-new-features-to-combat-insider-risk-in-microsoft-365
Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365
Varonis version 8.5 is here. Discover organization-wide exposure and learn how to combat insider risk in Microsoft 365 with this new update.
mixed-messages:-busting-box’s-mfa-methods
Mixed Messages: Busting Box’s MFA Methods
Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification.
watch:-reconnect---version-8.5-and-combating-insider-risks-in-microsoft-365
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
introducing-varonis-for-microsoft-365-copilot
Introducing Varonis for Microsoft 365 Copilot
Varonis for Microsoft 365 Copilot is the industry's first purpose-built cybersecurity solution to secure Microsoft’s AI-powered productivity tool before and after deployment.