What You May Have Missed

1. Here’s an interesting perspective from a CTO on why metadata matters. 2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect...
1 min read
Last updated January 17, 2023

1. Here’s an interesting perspective from a CTO on why metadata matters.

2. By September 30th, California Governor Jerry Brown will either veto or sign two very important bills that will protect student data and their privacy. Major protections of SB 1177 include prohibiting any website or mobile app from targeted advertising to K-12 students, their parents or legal guardians. The bill would also prohibit the sale and unauthorized access of student information. Meanwhile, AB 1584 deals with contracts between local educational agencies and third-party technology vendors. Once these two bills are signed into law, it would address a growing problem of mismanagement of student data and their privacy.

3. Earlier this week, the FTC held another Big Data workshop to continue its discussion on consumer privacy, “Big Data: A Tool for Inclusion or Exclusion?” Three major challenges that set the framework for theday-long workshop were: biased scores derived from credit reports, the unregulated world of data brokers and companies’ use of their own data about their customers. Solutions such as transparency and accountability were reiterated throughout the workshop.

4. The Data-Driven Marketing Institute reported that our “digital footprint” – which is comprised of data that we leave behind on a daily basis such as our location coordinates, time entered and exited a store, when a credit card is swiped, or an itemized list of things purchased – generated $156 billion dollars1 in 2012. This impressive figure is only just the beginning. As digital marketing becomes even more prevalent, organizations will soon be able to collect more data to develop a 360 degree view of customers’ thoughts and desires. As consumers contribute to this multi-billion dollar data industry, a question that’s coming up more often is, will we be compensated?

5. Privacy advocates have taken note of new features Apple has added in iOS 8. Under this version of the operating system that was just released on September 17, all personal data—photos, messages, contacts, email, call history –are encrypted by the device passcode. Previously, the key was maintained by Apple, thereby forcing the company to hand over passcodes when faced with law enforcement requests.  Under the new scheme, Apple can’t honor court warrants since it is unable to bypass the passcode. Apple has added two-factor authentication to its iCloud storage service, as well as an “always on” VPN feature.

 

 

 

 


  1. [1] http://ddminstitute.thedma.org/files/2014/06/DDMI-Webinar-Value-of-Data-Study-2013.10.17-FINAL.pdf

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

varonis-acquires-slashnext,-ai-native-email-security
Varonis Acquires SlashNext, AI-Native Email Security
Strategic acquisition adds the world’s best phishing and social engineering detection to the leading Data Security Platform.
anatomy-of-a-salesforce-data-breach:-stopping-user-impersonation
Anatomy of a Salesforce Data Breach: Stopping User Impersonation
How a bad actor systematically impersonates users to exfiltrate millions of Salesforce records.
why-data-centric-security-is-important-for-the-dod
Why Data-Centric Security is Important for the DoD
Learn how Varonis protects DoD environments by utilizing various approaches to secure sensitive data.
varonis-incident-response:-stopping-microsoft-365-direct-send-abuse 
Varonis Incident Response: Stopping Microsoft 365 Direct Send Abuse 
Learn how Varonis Threat Labs uncovered a critical Microsoft 365 Direct Send exploit, and how organizations leveraged Varonis Incident Response to protect themselves from attack.