Browsed by
Author: Adam Laub

Adam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism. Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
How STEALTHbits Helps with ITAR IT Compliance

How STEALTHbits Helps with ITAR IT Compliance

What is ITAR Compliance? The International Traffic in Arms Regulations (ITAR) is a United States regulatory compliance standard that restricts and controls the export of defense and military related technologies to safeguard U.S. national security. The U.S. Government requires all manufacturers, exporters, and brokers of defense articles, defense services or related technical data to be ITAR compliant. What are ITAR Requirements? For a company involved in the manufacture, sale or distribution of goods or services covered under the United States…

Read More Read More

File System Auditing

File System Auditing

File System Auditing Adequately and efficiently capturing file system access and change activities can dramatically increase an organization’s ability to detect insider threats, prevent data breaches, and mitigate the damage that can be done by advanced threats like crypto ransomware. Native file system auditing functions within file repositories like Windows file servers and NAS devices like NetApp and Dell/EMC, however, are highly challenging to work with – sometimes impossible – often resulting in a significant blind spot for security practitioners…

Read More Read More

Tips for Justifying a Data Classification Policy

Tips for Justifying a Data Classification Policy

What is Data Classification? In its simplest form, Data Classification is the process of categorizing datasets (e.g. files, databases, etc.) into logical groupings that makes what’s inside the data instantly understandable and contextual on the surface. In other words, it’s labeling. As a practical example, instead of having to open a file to examine its content and determine there’s sensitive data inside, a classification could be applied to one of the file’s available metadata tags to denote the contents within…

Read More Read More

10 Security Risks Almost Everyone Has

10 Security Risks Almost Everyone Has

If you’re responsible for the management and security of an Active Directory (AD) or Windows infrastructure, you already know you’ve got a tough job.  And with thousands of configurations and potential conditions to worry about across dozens of AD and Operating System (OS) versions, where do you even begin an effort to address your most at-risk conditions?  What are they to begin with?  If you’re at a loss, I’d suggest you start right here… Below I’ve listed 10 checks you…

Read More Read More

The “Five Most Prevalent Threats to Corporate Data”

The “Five Most Prevalent Threats to Corporate Data”

Of the hundreds (if not thousands) of blog posts and news articles published about cybersecurity every week, occasionally you come across a gem like this post by Kevin Jackson on Sys-Con.com called “For Top Cyber Threats, Look in the Mirror”. I highly suggest you give it a read -> http://www.sys-con.com/?q=node/3943325 To break it down simply, Jackson’s article focused on a recent report released by cybersecurity assessment and advisory services provider, Praetorian, called “How to Dramatically Improve Corporate IT Security without Spending…

Read More Read More

Version 4.0 of StealthINTERCEPT is now available

Version 4.0 of StealthINTERCEPT is now available

StealthINTERCEPT v4.0 is now generally available and it’s loaded with exciting new features and enhancements for every StealthINTERCEPT user to leverage, including: Authentication Blocking Operation-level Monitoring for Exchange Mailboxes Automatic File System Activity Blocking Learn more by watching this brief video: Don’t miss a post! Subscribe to The Insider Threat Security Blog here:   StealthINTERCEPT Customers: Contact support@stealthbits.com with questions or for assistance with upgrading. Adam LaubAdam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible…

Read More Read More

What’s New in StealthAUDIT v7.2?

What’s New in StealthAUDIT v7.2?

A “dot” release has never packed a bigger punch! The latest release of StealthAUDIT is all about what it should be; controlling and securing credentials and data. Attackers – whether internal or external – are after at least one of these two things, but usually both.  They continue to slip past the perimeter with relative ease, and once they do, operate undetected and largely unencumbered while they map out the environment and infect system after system like a digital cowbird….

Read More Read More

Monitoring File Activity: Want the needle? Take a flamethrower to the haystack.

Monitoring File Activity: Want the needle? Take a flamethrower to the haystack.

I know it’s so cliché, but it’s a great analogy. Trying to find the events that matter in your native file activity logs on Windows and NAS devices is like finding a needle in a haystack. These logs are so verbose, so performance-intensive, and so difficult to manage that most organizations don’t even bother with them. But, anything can be in any file. Any file can be the one that sinks you. As a result, every file equals risk. And if I’m trying to…

Read More Read More

There’s no Such Thing as a Secure System

There’s no Such Thing as a Secure System

A few days ago I had the opportunity to attend the Evanta 2016 New York CISO Executive Summit. It was a great event, attended by leaders in information security on both the customer and vendor sides of the equation. Throughout the day, CISO’s from some of the world’s largest organizations and other thought leaders in the world of cybersecurity presented in keynote and breakout sessions, offering up their thoughts on the state of security and advice on where to focus…

Read More Read More

2016 Verizon DBIR – Fundamentals Still Lacking In Favor Of Industry Buzzwords

2016 Verizon DBIR – Fundamentals Still Lacking In Favor Of Industry Buzzwords

Just like every previous year, the 2016 Verizon Data Breach Investigations Report (DBIR) highlighted the same, sad fact – attackers are getting more sophisticated, the number of attacks are rising, and so are attack success rates.  Not coincidentally, the reasons for these increases come down to the same old things – poor patching processes, lack of visibility and control over critical configurations, and an inability to focus one’s limited resources on the right things. Patching? Configuration? Prioritization? Really? When I…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.