Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings.
Browsing: Identity and Access Management (IAM)
The benefits of adopting cloud technologies have been widely reported and are commonly understood. However, cloud brings with it many questions and concerns about jurisdictional and regulatory control over the privacy and protection of sensitive data.
Varonis, the leading provider of comprehensive data governance software, today detailed how it has helped AXA Wealth identify and control its data permissions.
Andy Green of Varonis shares his thoughts on the latest privacy showdown coming from the EU
An email address that’s used for online banking and business purposes can be highly valuable for cybercriminals.
Remotely taking control of someone’s computer is not an unheard of hacker exploit, but this claim about remotely controlling a Chinese hacker’s webcam is just crazy.
Tumblr’s iOS app fails to log users in through a secure (SSL) server, it has emerged.
On the tiny Mediterranean island of Malta, two Italian hackers have been searching for bugs—not the island’s many beetle varieties, but secret flaws in computer code that governments pay hundreds of thousands of dollars to learn about and exploit.
A new Red Alert Research Report from Varonis, based on survey data from 248 information security professionals, indicates that a mere 6% of companies have automated breach detection.
Over the last number of years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). Notable examples of said attacks include the Red October campaign or the IXESHE APT.