Browsed by
Author: Adam Laub

Adam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism. Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.
Don’t Call It a Comeback

Don’t Call It a Comeback

When I first started at STEALTHbits, times were different. Technology was different. There were different problems to solve then. And with the advent and evolution of an endless stream of new technologies over the past decade from mobile devices to social media, Voice-over-IP (VoIP) to “big data”, the problems to solve keep on coming. Not surprisingly – especially considering the rate at which technology has evolved – “old” problems are still very “real” problems. One such instance is Patch Management….

Read More Read More

RSA Conference 2014 Recap: Mission Accomplished

RSA Conference 2014 Recap: Mission Accomplished

At this year’s RSA Conference 2014 in San Francisco, Gary S. Miliefsky of Cyber Defense Magazine (CDM) visited the STEALTHbits booth where we got to talking about who STEALTHbits is, what we do, and what we were talking with conference attendees about at the show. Here’s what Gary had to say about STEALTHbits in his post-conference annual trip report, included in CDM’s Cyber Warnings E-Magazine released on April 1, 2014: “I hung out with these guys for a bit and…

Read More Read More

The OWASP Top 10: Then and Now

The OWASP Top 10: Then and Now

The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT security organization formed in 2001. In this article, we review the 2013 edition of this popular security resource. The OWASP Top 10 Is Revised Every Three Years OWASP aims to update the Top 10 once every three years as IT security threats evolve over time, and the OWASP Top 10 for 2013 will be…

Read More Read More

Putting Unstructured Data Into Context

Putting Unstructured Data Into Context

WHAT THE ‘COSMOS’ CAN TEACH US ABOUT UNSTRUCTURED DATA How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about planets, our solar system, or maybe our galaxy. You may have thought about it in the opposite direction, in the context of atoms, neutrons, electrons,…

Read More Read More

Why StealthAUDIT?

Why StealthAUDIT?

I’m frequently asked why I think StealthAUDIT provides a better alternative to some other product on the market. The answer often comes down to the same core differentiators: StealthAUDIT takes a very different approach to other solutions on the market. While other products attempt to anticipate what reports you might need and package only those into a product set, the StealthAUDIT platform enables a flexible approach to answer virtually ANY question you have today or in the future. The SMP…

Read More Read More

Active Directory Tools Versus Native Auditing

Active Directory Tools Versus Native Auditing

This is re-posted from an earlier post but seems as relevant as ever. If you’re thinking about monitoring Active Directory events, you’ll no doubt consider what’s involved in leveraging native event logging and how that relates to tools that are designed for AD event monitoring. In that context, below, we describe a few of the steps involved in setting up native event logging for Active Directory. Determine Which Events You Need First, you need to understand which events you need…

Read More Read More

Active Directory Unification

Active Directory Unification

It’s no secret that over the past decade, Active Directory has grown out of control across many organizations. It’s partly due to organizational mergers or disparate Active Directory domains that sprouted up over time, but you may find yourself looking at dozens or even hundreds of Active Directory domains and realize that it’s time to consolidate. And it probably feels overpowering. But despite the effort in front of you, there’s an easy way and a right way. Domain consolidation is…

Read More Read More

Active Directory Monitoring

Active Directory Monitoring

One of the most important things you can do to improve the security posture of your IT infrastructure is to provide in-depth monitoring of Active Directory. STEALTHbits provides numerous solutions to assist with monitoring numerous Active Directory security events. With deep visibility into administrative changes such as user account creations, group changes, and changes to Group Policy Objects (GPOs), STEALTHbits enables a complete audit trail with real-time alerts when high-risk activity takes place. The StealthINTERCEPT line also serves as a…

Read More Read More

Timeless Information Technology (IT) Joke

Timeless Information Technology (IT) Joke

LOST IN A HOT AIR BALLOON A man piloting a hot air balloon is hopelessly lost. He descends to a lower altitude and locates a man down on the ground. He lowers the balloon and shouts, “excuse me, can you tell me where I am?” The man below states, “yes, you’re in a hot air balloon, about 30 feet above this field.” “You must work in Information Technology,” said the balloonist. “Yes I do,” replies the man. “And how did…

Read More Read More

StealthMAINTAIN for Active Directory: Marketing Derails Product Management Processes (Leak 2)

StealthMAINTAIN for Active Directory: Marketing Derails Product Management Processes (Leak 2)

If there were an award for Supersleuth Marketing Team of the year, STEALTHbits’ would be on the short list. We’ve crept around corridors and hid out in conference rooms to bring you the latest buzz on groundbreaking products that’ll be out soon. Earlier this year, we brought you a first look at StealthINTERCEPT, a game-changing real-time Active Directory solution. Now, we’ve cornered Dave Bullas, Product Manager for Active Directory, and convinced him to answer just a few questions about the…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.