Browsed by
Author: Adam Laub

Adam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism. Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
PIM is Great. Cake is Too.

PIM is Great. Cake is Too.

Just like a great piece of cake, PIM (Privileged Identity Management) has its proper ingredients too. Without the flour, is your cake really cake? Without understanding which accounts in your environment are actually privileged, are you really managing privileged identities? Certainly this is a matter of opinion, as we shouldn’t allow ourselves to operate in an all-or-nothing mindset – things don’t have to be perfect for them to be effective – but the point is that fundamentals make a difference….

Read More Read More

Detect and Prevent Ransomware

Detect and Prevent Ransomware

There are many sources of motivation for hackers and bad actors to do what they do, but ransomware attacks are driven by two primary motives; money and destruction. However, even though there are dozens of ransomware variants with new mutations being discovered weekly, they all exhibit the same common behavior; large volumes of file modifications in short periods of time. If you’re going to do this, you need to detect unusual or abnormally high file system activity in short timeframes…

Read More Read More

Cutting the Bad Guys off at the Pass

Cutting the Bad Guys off at the Pass

I spent part of my Father’s Day weekend as a quintessential dad: lying on the couch watching “300”, the fictional portrayal of the Battle of Thermopylae, where – in the movie – a force of 300 elite Spartan warriors held off a massive Persian army by forcing the Persians to pass through a narrow canyon road to affect their invasion of Greece. The pass at Thermopylae was the smart place to fight the Persians since the bad guys – at…

Read More Read More

The Best Offense is a Great Defense

The Best Offense is a Great Defense

I’ve been a sports fan all my life. If you’re into sports tactics at all, you know a common offensive scheme in virtually any sport is to spatially spread out the opposing team’s defense. Why? It creates space to maneuver, opening up options for attack that just aren’t there when everyone is bunched up in a group. However, the best defenses limit the offense’s ability to spread the field/court/pitch (what have you) with matchups. Matchups essentially render certain forms of…

Read More Read More

Detecting Attacks Using Active Directory Authentication Analytics

Detecting Attacks Using Active Directory Authentication Analytics

When a user logs on to their workstation in the morning, Active Directory authenticates them and authorizes their access. When they access a network file share or SharePoint site, RDC to another system, log into CRM, open up Outlook, or do any number of things where access is involved, AD handles the request and approves or denies entry. Active Directory is the authentication and authorization hub of nearly every organization’s IT infrastructure, and it sees all. The vast amount of…

Read More Read More

The Canary in the Coal Mine

The Canary in the Coal Mine

Shutting down an attack before it’s too late Practically every device on the network produces logs of activity and these logs contain records of authentications, changes, software installs, etc. Companies have invested in technologies like SIEM to help digest these logs and raise alerts. So, why are we seeing these breaches on the rise? Data does not equal intelligence, and intelligence is what’s used to detect problems. You’ll never detect the threat using generic tools and technologies, such as consuming…

Read More Read More

File Sync & Share – With Freedom Comes Great Insecurity

File Sync & Share – With Freedom Comes Great Insecurity

It’s no secret that we live in a time where the standard is for people to be connected 24/7. As more and more businesses embrace the concept of Bring Your Own Device (BYOD), this standard of perpetual connectivity is only being reinforced. I’ll save commentary on the health of such a standard for another time, but the reality of this standard in a business context is that people need access to their data constantly and from anywhere. Enter the File,…

Read More Read More

AD Optimization and IAM

AD Optimization and IAM

From the vantage point that most people have, even technical folks, Active Directory (AD) seems like it’s doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage? Of course, those close to AD know this is an illusion. AD has so many layers of failure resistance, it’s natural that…

Read More Read More

NEW PRODUCT UPDATE: File Activity Monitoring – À la carte

NEW PRODUCT UPDATE: File Activity Monitoring – À la carte

Got some exciting news from STEALTHbits’ Product Management team last week about our new Data Activity Tracking product line, which offers customers the ability to monitor file access events on their Windows and NAS devices, including recently added support for EMC Isilon devices. I asked them, “Why is this being treated as a new product? We’ve been offering this capability within our Data Access Governance solution for years.” Their answer was, “Because now we can offer it as a standalone…

Read More Read More

Increased Focus on Insider Threat from the Verizon DBIR in 2014 – Who Do You Trust?

Increased Focus on Insider Threat from the Verizon DBIR in 2014 – Who Do You Trust?

Every year Verizon produces the Data Breach Investigations Report (DBIR). It’s bad form on a blog to say “stop reading my content and go read this other content,” but I’ll start by saying that if you’ve never used this report as an asset in your security planning you should absolutely drop everything and go read this. Each year it’s a treasure trove of data and analysis. It’s also readable and has a sense of humor. Many people I know use…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.