Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits

Posts by Tuula Fai

Home >Tuula Fai
Tuula Fai is the Senior Marketing Director of StealthAUDIT at STEALTHbits. For the past 20 years, she has worked in a variety of roles within the software industry, starting as a developer and implementation engineer before moving into product marketing and digital campaigns. Having worked in both customer service and human resources, she is passionate about safeguarding customer and employee data as part of overall security initiatives. She graduated Summa cum Laude from Georgetown with an MBA in marketing and IT, and has won two technology marketing awards. You can find her running and writing in the Rocky Mountains of Colorado.

3 Key Takeaways from NetApp Insight 2017

| Tuula Fai | Uncategorized | Leave a Comment

NetApp Insight, NetApp’s annual technical conference, brought together storage and data management professionals to discuss changing the world with data. In over 200 technical sessions and the Insight Central exhibit hall, organizations learned how NetApp’s Data Fabric can help them: Harness the power of the hybrid cloud Build a next-generation data center Modernize storage through […]

Learn How to Defeat Advanced Attacks against Active Directory at Microsoft Ignite 2017

| Tuula Fai | Uncategorized | Leave a Comment

There’s a lot of news coverage on threats like ransomware, malware, and phishing that are all about punching holes in organizations to grab quick spoils. But what isn’t getting a lot of coverage is the careful, patient planning attackers do once inside your Microsoft Active Directory (AD) environment. They fly under the radar scoping out […]

Stealthbits Introduces Automated Machine Learning to Data Access Governance at NetApp Insight

| Tuula Fai | Uncategorized | Leave a Comment

Stealthbits CTO, Jonathan Sander, recently returned from a road trip across the U.S. where he met with several customers. One of them remarked that finding sensitive data across his organization was like trying to find Waldo in the children’s book series, Where’s Waldo. The customer went on to say, ‘Even if we find it, we […]

See a File Activity Monitor Demo without Leaving Your Desk

File Activity Monitoring Organizations spend thousands, if not millions of dollars, on their data storage infrastructure. However, many lack visibility into file activity on Network-attached storage (NAS) devices like NetApp, Dell EMC, and Hitachi—as well as Windows devices. This is because native auditing can present challenges like configuration complexity, undifferentiated events, and performance issues. As […]

Gain Visibility into the Most Important Activity on Your Network with File Activity Monitoring

File Activity Monitoring With Russia’s suspected hacking of the U.S. elections still in the news, our office conversation turned to the topic of Edward Snowden. One of our executives commented that even with the billions the government spent on cybersecurity—including technologies like User and Entity Behavior Analytics (UEBA)—officials still don’t know exactly what information Snowden […]

StealthAUDIT 8.0: Active Directory Permissions Analyzer

Active Directory Permissions The release of StealthAUDIT 8.0 delivers enhanced Active Directory (AD) Permissions analysis capabilities. This is welcome news to the over 90% of organizations that use Active Directory to control who can access their network and resources. I say welcome because there are so many different ways to grant privileged access to AD […]

3 Ways to Improve Your Security Posture by Extending IAM into Unstructured Data and PAM

Laying the Groundwork for a Success IAM Deployment Implementing an Identity and Access Management (IAM) solution is a complex undertaking that involves significant investment in time and resources. As a result, project leaders are laser-focused on extending IAM’s footprint to accomplish three goals: Strengthen their security posture Maximize technology value Increase Return on Investment With […]

IoT is Fantastic. But Are We Missing a Step in Cybersecurity? Cybersecurity Luminary Charles Tendell Interviews Stealthbits’ Brad Bussie

| Tuula Fai | Uncategorized | Leave a Comment

There will be 34 billion devices connected to the internet by 2020 – Business Insider The Internet of Things (IoT) has been a hot topic for a few years. The discussion, however, has focused more on the convenience of having ‘things’ like televisions, refrigerators, and cars connected to the Internet—rather than on their security. Cybersecurity […]

5 Steps for Adopting Privileged Local Account Auditing Best Practices

| Tuula Fai | Uncategorized | Leave a Comment

In listening to Brad Bussie’s recent webinar, I learned that securing privileged access is a complex and serious problem for organizations of any size. In a recent cybersecurity study by Praetorian, they ranked privileged system access among the top five most prevalent threats to corporate data. Why? Because system-level access has sprawled significantly over the […]

5 Steps to Building a Successful Data Access Governance (DAG) Program

| Tuula Fai | Uncategorized | Leave a Comment

In listening to Adam Rosen’s recent webinar, I learned that nearly 60 percent of security breaches involve the theft of unstructured data.[i] And, only 12 percent of organizations are confident they can detect a breach involving unstructured data.[ii] Given that 80% of an organization’s data is unstructured,[iii] is it any wonder a hacker was able […]

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL