Browsed by
Author: Adam Laub

Adam Laub is the Senior Vice President of Product Management at STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism. Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, and Operational Management roles. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
Cutting the Bad Guys off at the Pass

Cutting the Bad Guys off at the Pass

I spent part of my Father’s Day weekend as a quintessential dad: lying on the couch watching “300”, the fictional portrayal of the Battle of Thermopylae, where – in the movie – a force of 300 elite Spartan warriors held off a massive Persian army by forcing the Persians to pass through a narrow canyon road to affect their invasion of Greece. The pass at Thermopylae was the smart place to fight the Persians since the bad guys – at…

Read More Read More

The Best Offense is a Great Defense

The Best Offense is a Great Defense

I’ve been a sports fan all my life. If you’re into sports tactics at all, you know a common offensive scheme in virtually any sport is to spatially spread out the opposing team’s defense. Why? It creates space to maneuver, opening up options for attack that just aren’t there when everyone is bunched up in a group. However, the best defenses limit the offense’s ability to spread the field/court/pitch (what have you) with matchups. Matchups essentially render certain forms of…

Read More Read More

Detecting Attacks Using Active Directory Authentication Analytics

Detecting Attacks Using Active Directory Authentication Analytics

When a user logs on to their workstation in the morning, Active Directory authenticates them and authorizes their access. When they access a network file share or SharePoint site, RDC to another system, log into CRM, open up Outlook, or do any number of things where access is involved, AD handles the request and approves or denies entry. Active Directory is the authentication and authorization hub of nearly every organization’s IT infrastructure, and it sees all. The vast amount of…

Read More Read More

The Canary in the Coal Mine

The Canary in the Coal Mine

Shutting down an attack before it’s too late Practically every device on the network produces logs of activity and these logs contain records of authentications, changes, software installs, etc. Companies have invested in technologies like SIEM to help digest these logs and raise alerts. So, why are we seeing these breaches on the rise? Data does not equal intelligence, and intelligence is what’s used to detect problems. You’ll never detect the threat using generic tools and technologies, such as consuming…

Read More Read More

File Sync & Share – With Freedom Comes Great Insecurity

File Sync & Share – With Freedom Comes Great Insecurity

It’s no secret that we live in a time where the standard is for people to be connected 24/7. As more and more businesses embrace the concept of Bring Your Own Device (BYOD), this standard of perpetual connectivity is only being reinforced. I’ll save commentary on the health of such a standard for another time, but the reality of this standard in a business context is that people need access to their data constantly and from anywhere. Enter the File,…

Read More Read More

AD Optimization and IAM

AD Optimization and IAM

From the vantage point that most people have, even technical folks, Active Directory (AD) seems like it’s doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage? Of course, those close to AD know this is an illusion. AD has so many layers of failure resistance, it’s natural that…

Read More Read More

NEW PRODUCT UPDATE: File Activity Monitoring – À la carte

NEW PRODUCT UPDATE: File Activity Monitoring – À la carte

Got some exciting news from STEALTHbits’ Product Management team last week about our new Data Activity Tracking product line, which offers customers the ability to monitor file access events on their Windows and NAS devices, including recently added support for EMC Isilon devices. I asked them, “Why is this being treated as a new product? We’ve been offering this capability within our Data Access Governance solution for years.” Their answer was, “Because now we can offer it as a standalone…

Read More Read More

Increased Focus on #Insider #Threat from the Verizon #DBIR in 2014 – Who Do You Trust?

Increased Focus on #Insider #Threat from the Verizon #DBIR in 2014 – Who Do You Trust?

Every year Verizon produces the Data Breach Investigations Report (DBIR). It’s bad form on a blog to say “stop reading my content and go read this other content,” but I’ll start by saying that if you’ve never used this report as an asset in your security planning you should absolutely drop everything and go read this. Each year it’s a treasure trove of data and analysis. It’s also readable and has a sense of humor. Many people I know use…

Read More Read More

Don’t Call It a Comeback

Don’t Call It a Comeback

When I first started at STEALTHbits, times were different. Technology was different. There were different problems to solve then. And with the advent and evolution of an endless stream of new technologies over the past decade from mobile devices to social media, Voice-over-IP (VoIP) to “big data”, the problems to solve keep on coming. Not surprisingly – especially considering the rate at which technology has evolved – “old” problems are still very “real” problems. One such instance is Patch Management….

Read More Read More

RSA Conference 2014 Recap: Mission Accomplished

RSA Conference 2014 Recap: Mission Accomplished

At this year’s RSA Conference 2014 in San Francisco, Gary S. Miliefsky of Cyber Defense Magazine (CDM) visited the STEALTHbits booth where we got to talking about who STEALTHbits is, what we do, and what we were talking with conference attendees about at the show. Here’s what Gary had to say about STEALTHbits in his post-conference annual trip report, included in CDM’s Cyber Warnings E-Magazine released on April 1, 2014: “I hung out with these guys for a bit and…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.