Browsed by
Author: Adam Laub

Adam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism. Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
There’s no Such Thing as a Secure System

There’s no Such Thing as a Secure System

A few days ago I had the opportunity to attend the Evanta 2016 New York CISO Executive Summit. It was a great event, attended by leaders in information security on both the customer and vendor sides of the equation. Throughout the day, CISO’s from some of the world’s largest organizations and other thought leaders in the world of cybersecurity presented in keynote and breakout sessions, offering up their thoughts on the state of security and advice on where to focus…

Read More Read More

2016 Verizon DBIR – Fundamentals Still Lacking In Favor Of Industry Buzzwords

2016 Verizon DBIR – Fundamentals Still Lacking In Favor Of Industry Buzzwords

Just like every previous year, the 2016 Verizon Data Breach Investigations Report (DBIR) highlighted the same, sad fact – attackers are getting more sophisticated, the number of attacks are rising, and so are attack success rates.  Not coincidentally, the reasons for these increases come down to the same old things – poor patching processes, lack of visibility and control over critical configurations, and an inability to focus one’s limited resources on the right things. Patching? Configuration? Prioritization? Really? When I…

Read More Read More

PIM is Great. Cake is Too.

PIM is Great. Cake is Too.

Just like a great piece of cake, PIM (Privileged Identity Management) has its proper ingredients too. Without the flour, is your cake really cake? Without understanding which accounts in your environment are actually privileged, are you really managing privileged identities? Certainly this is a matter of opinion, as we shouldn’t allow ourselves to operate in an all-or-nothing mindset – things don’t have to be perfect for them to be effective – but the point is that fundamentals make a difference….

Read More Read More

Detect and Prevent Ransomware

Detect and Prevent Ransomware

There are many sources of motivation for hackers and bad actors to do what they do, but ransomware attacks are driven by two primary motives; money and destruction. However, even though there are dozens of ransomware variants with new mutations being discovered weekly, they all exhibit the same common behavior; large volumes of file modifications in short periods of time. If you’re going to do this, you need to detect unusual or abnormally high file system activity in short timeframes…

Read More Read More

Cutting the Bad Guys off at the Pass

Cutting the Bad Guys off at the Pass

I spent part of my Father’s Day weekend as a quintessential dad: lying on the couch watching “300”, the fictional portrayal of the Battle of Thermopylae, where – in the movie – a force of 300 elite Spartan warriors held off a massive Persian army by forcing the Persians to pass through a narrow canyon road to affect their invasion of Greece. The pass at Thermopylae was the smart place to fight the Persians since the bad guys – at…

Read More Read More

The Best Offense is a Great Defense

The Best Offense is a Great Defense

I’ve been a sports fan all my life. If you’re into sports tactics at all, you know a common offensive scheme in virtually any sport is to spatially spread out the opposing team’s defense. Why? It creates space to maneuver, opening up options for attack that just aren’t there when everyone is bunched up in a group. However, the best defenses limit the offense’s ability to spread the field/court/pitch (what have you) with matchups. Matchups essentially render certain forms of…

Read More Read More

Detecting Attacks Using Active Directory Authentication Analytics

Detecting Attacks Using Active Directory Authentication Analytics

When a user logs on to their workstation in the morning, Active Directory authenticates them and authorizes their access. When they access a network file share or SharePoint site, RDC to another system, log into CRM, open up Outlook, or do any number of things where access is involved, AD handles the request and approves or denies entry. Active Directory is the authentication and authorization hub of nearly every organization’s IT infrastructure, and it sees all. The vast amount of…

Read More Read More

The Canary in the Coal Mine

The Canary in the Coal Mine

Shutting down an attack before it’s too late Practically every device on the network produces logs of activity and these logs contain records of authentications, changes, software installs, etc. Companies have invested in technologies like SIEM to help digest these logs and raise alerts. So, why are we seeing these breaches on the rise? Data does not equal intelligence, and intelligence is what’s used to detect problems. You’ll never detect the threat using generic tools and technologies, such as consuming…

Read More Read More

File Sync & Share – With Freedom Comes Great Insecurity

File Sync & Share – With Freedom Comes Great Insecurity

It’s no secret that we live in a time where the standard is for people to be connected 24/7. As more and more businesses embrace the concept of Bring Your Own Device (BYOD), this standard of perpetual connectivity is only being reinforced. I’ll save commentary on the health of such a standard for another time, but the reality of this standard in a business context is that people need access to their data constantly and from anywhere. Enter the File,…

Read More Read More

AD Optimization and IAM

AD Optimization and IAM

From the vantage point that most people have, even technical folks, Active Directory (AD) seems like it’s doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage? Of course, those close to AD know this is an illusion. AD has so many layers of failure resistance, it’s natural that…

Read More Read More

Start a Free Stealthbits Trial!

No risk. No obligation.