Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

Stealthbits

Posts by Adam Laub

Home >Adam Laub
As General Manager, Adam is responsible for product lifecycle and market adoption from concept to implementation through to customer success. He is passionate about market strategies, and developing long-term path for success for our customers and partners. Previously, Adam served as CMO and has held a variety of senior leadership positions at Stealthbits - now part of Netwrix including Sales, Marketing, Product Management, and Operational Management roles where his focus has consistently been setting product strategy, defining roadmap, driving strategic engagements and product evangelism. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Cover Your Six: Enhanced Visibility into Credential and Data Risks with StealthAUDIT v8.1

| Adam Laub | Uncategorized | Leave a Comment

Awareness is the first and most essential ingredient in any successful risk mitigation strategy.  StealthAUDIT v8.1 has been enhanced to extend your awareness into high risk conditions that can easily sneak up on you in three key ways: SQL Database Security – Discover, assess access, and monitor activity within SQL databases, scouring each for sensitive […]

What is ITAR Compliance? How Stealthits can Help

| Adam Laub | Compliance | Leave a Comment

What is ITAR Compliance? The International Traffic in Arms Regulations (ITAR) is a United States regulatory compliance standard that restricts and controls the export of defense and military-related technologies to safeguard U.S. national security. The U.S. Government requires all manufacturers, exporters, and brokers of defense articles, defense services or related technical data to be ITAR […]

File System Auditing

File System Auditing Adequately and efficiently capturing file system access and change activities can dramatically increase an organization’s ability to detect insider threats, prevent data breaches, and mitigate the damage that can be done by advanced threats like crypto ransomware. Native file system auditing functions within file repositories like Windows file servers and NAS devices […]

10 Security Risks Almost Everyone Has

| Adam Laub | Uncategorized | Leave a Comment

If you’re responsible for the management and security of an Active Directory (AD) or Windows infrastructure, you already know you’ve got a tough job.  And with thousands of configurations and potential conditions to worry about across dozens of AD and Operating System (OS) versions, where do you even begin an effort to address your most […]

The “Five Most Prevalent Threats to Corporate Data”

| Adam Laub | Uncategorized | Leave a Comment

Of the hundreds (if not thousands) of blog posts and news articles published about cybersecurity every week, occasionally you come across a gem like this post by Kevin Jackson on Sys-Con.com called “For Top Cyber Threats, Look in the Mirror”. I highly suggest you give it a read -> http://www.sys-con.com/?q=node/3943325 To break it down simply, Jackson’s […]

Version 4.0 of StealthINTERCEPT is now available

| Adam Laub | Uncategorized | Leave a Comment

StealthINTERCEPT v4.0 is now generally available and it’s loaded with exciting new features and enhancements for every StealthINTERCEPT user to leverage, including: Authentication Blocking Operation-level Monitoring for Exchange Mailboxes Automatic File System Activity Blocking Learn more by watching this brief video: Don’t miss a post! Subscribe to The Insider Threat Security Blog here:   StealthINTERCEPT […]

What’s New in StealthAUDIT v7.2?

A “dot” release has never packed a bigger punch! The latest release of StealthAUDIT is all about what it should be; controlling and securing credentials and data. Attackers – whether internal or external – are after at least one of these two things, but usually both.  They continue to slip past the perimeter with relative […]

Monitoring File Activity: Want the needle? Take a flamethrower to the haystack.

I know it’s so cliché, but it’s a great analogy. Trying to find the events that matter in your native file activity logs on Windows and NAS devices is like finding a needle in a haystack. These logs are so verbose, so performance-intensive, and so difficult to manage that most organizations don’t even bother with them. But, […]

There’s no Such Thing as a Secure System

A few days ago I had the opportunity to attend the Evanta 2016 New York CISO Executive Summit. It was a great event, attended by leaders in information security on both the customer and vendor sides of the equation. Throughout the day, CISO’s from some of the world’s largest organizations and other thought leaders in […]

2016 Verizon DBIR – Fundamentals Still Lacking In Favor Of Industry Buzzwords

Just like every previous year, the 2016 Verizon Data Breach Investigations Report (DBIR) highlighted the same, sad fact – attackers are getting more sophisticated, the number of attacks are rising, and so are attack success rates.  Not coincidentally, the reasons for these increases come down to the same old things – poor patching processes, lack […]

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL