Top 10 Data Security Sessions at the RSA Conference 2017

Top 10 Data Security Sessions at the RSA Conference 2017

It is that time of year again, time to get our bags packed and head to San Francisco for the RSA Conference. This year’s theme is the Power of Opportunity–which is a fitting theme for most security companies as they move toward partnerships that benefit end users. As a cybersecurity company that focuses on credentials and data, we thought it would be helpful to select a top 10 list of data security sessions for you to attend while at RSA….

Read More Read More

IoT is Fantastic. But Are We Missing a Step in Cybersecurity? Cybersecurity Luminary Charles Tendell Interviews STEALTHbits’ Brad Bussie

IoT is Fantastic. But Are We Missing a Step in Cybersecurity? Cybersecurity Luminary Charles Tendell Interviews STEALTHbits’ Brad Bussie

There will be 34 billion devices connected to the internet by 2020 – Business Insider The Internet of Things (IoT) has been a hot topic for a few years. The discussion, however, has focused more on the convenience of having ‘things’ like televisions, refrigerators, and cars connected to the Internet—rather than on their security. Cybersecurity expert Charles Tendell contends this is because we don’t think as much about the security of our appliances, vehicles, and other personal devices as we…

Read More Read More

Market Trends: 2017 Cybersecurity Trends

Market Trends: 2017 Cybersecurity Trends

2017 – A New Hope Protecting your company in 2017 should start from the inside out. Organizations have spent the last decade securing the perimeter from external threats with a fair amount of success. However, in the last couple years one of the most serious threats to cybersecurity stepped to the fore: the Insider.  StaySafeOnline.org recently highlighted the importance of training more of your employees to become security aware. The idea is to have many eyes focused on securing an…

Read More Read More

STEALTHbits ProTip: Maximize Your StealthAUDIT Investment with Reporting

STEALTHbits ProTip: Maximize Your StealthAUDIT Investment with Reporting

This month I’d like to touch on a fairly unknown usability feature within StealthAUDIT. The Reports Only mode allows the console to be run without risk of triggering any collections or affecting any already existing data sets. There is an underused (but very useful) command line switch that allows you to run StealthAUDIT so that it can only generate reports. When run in Reports Only mode the Query, Analysis, and Action functions will be disabled. From the command line, first…

Read More Read More

5 Challenges with Combining Data Access Governance and Identity Access Management

5 Challenges with Combining Data Access Governance and Identity Access Management

In a recent webinar, I discussed the five challenges that are faced when combining Data Access Governance and Identity and Access Management. The Identity Access Management Blindspot Unstructured data represents a significant risk for every organization. The files spread across file systems, SharePoint sites, and cloud applications continue to grow at a rapid pace, making it difficult to enforce proper security measures. For years, organizations have relied upon Identity and Access Management (IAM) solutions to provision users and manage access…

Read More Read More

5 Cybersecurity Trends for 2017

5 Cybersecurity Trends for 2017

It’s December, the holidays are upon us, and it’s that time of the year for the proverbial “2017 predictions” blog. Not to be left out of all the fun, we went around to a few of our resident industry experts here at STEALTHbits to get their opinions of what trends will emerge in the New Year within the world of cybersecurity. Check out what they had to say: Trend #1 – Create a Cybersecurity Talent Brand “Let’s face it –…

Read More Read More

Best Practices for Auditing Active Directory

Best Practices for Auditing Active Directory

Some years ago I worked as a software implementation consultant in the public sector. An IT Director pulled me into his office one day to ask about my team’s ERP deployment. After I answered his questions he said, “That all sounds fine. What isn’t so fine is the state of my Active Directory.” He proceeded to show me thousands of stale accounts across agencies, as well as global access rights that could put sensitive budget information at risk. What he…

Read More Read More

Optimizing Your Data Governance Strategy for EU GDPR

Optimizing Your Data Governance Strategy for EU GDPR

With European Union General Data Protection Regulation (EU GDPR) set to take effect on May 25, 2018, the proper handling of personal data is more critical than ever. Last April, my colleague, Mark Wilson, explained exactly how the new regulations will impact US and multi-national companies that process personal data of EU citizens. Among the highlights are breach notification within 72 hours and astronomical fines for non-compliance. Here are some strategies savvy organizations are implementing to detect and prevent the sort…

Read More Read More

STEALTHbits ProTip: Defending Against Ransomware in 2017

STEALTHbits ProTip: Defending Against Ransomware in 2017

With the close of 2016 approaching, I looked back and realized that Ransomware could have been the subject of my ProTip every month this year! Not only has it been regularly grabbing headlines throughout the last twelve months, but I’m sure 2017’s threat-surface will be subject to even more attacks. And while I’ve already provided tips on ransomware twice, this time I’d like to talk about the methodology behind a competent defense as we close out 2016. Credential Abuse: this…

Read More Read More

Market Trends: Don’t Be Your Own Worst Enemy

Market Trends: Don’t Be Your Own Worst Enemy

The year 2016 is being called the Year of the Breach. A recent study by the Ponemon Institute shows that two-thirds of organizations affected by a cyber breach are unable to recover from the attack. Imagine these organizations – so many of them – ceasing to operate one by one as wanton and malicious cyber-attacks damage their critical infrastructure, reveal operational strategies or trade secrets to competitors, or even taint the public’s perception of an entire brand! Of course it’s…

Read More Read More