Browsed by
Author: Corin Imai

Corin Imai is a Director of Marketing for STEATHbits. Corin began her career working on server, application and desktop virtualization, networking, software-as-a-service, and cloud computing technologies before delving into application and data security. In her current capacity at STEALTHbits, she manages the industry-leading StealthAUDIT suite that enterprises around the world depend on to defend their most critical information. Corin can be found on Twitter @corinimai

2017 Cybersecurity Recap & 2018 Predictions

2017 Cybersecurity Recap & 2018 Predictions

As we begin to wrap up 2017 and reflect back on the year, we looked at what the industry has accomplished and in some cases where we have fallen short. In the early part of this year many industry thought leaders were stating that 2017 would again be the year of ransomware. They were all very correct in their statements, but this year has shown us much more, it has shown us the increasing need for cybersecurity insurance, data access…

Read More Read More

Market Trends: Risk Based Security – Compliance Based Security – Security Through Obscurity

Market Trends: Risk Based Security – Compliance Based Security – Security Through Obscurity

What Security Strategy is Best For Your Organization? There are some great examples of Chief Executive Officers (CEOs) and Chief Information Security Officers (CISOs) working together towards protecting their employees, customers, and organization. On the other end of the spectrum, you have CEOs and CISOs that do not work well together. In order to evenly align your security strategy with the business’s needs, you have to be able to see eye-to-eye on the key issue of how your organization’s security…

Read More Read More

Market Trends: NYCRR 500

Market Trends: NYCRR 500

The New York State Department of Financial Services (DFS) new cybersecurity standard, New York Code Rules and Regulations 500 (NYCRR 500), extends past New York state limits to “subsidiaries or affiliates”. This regulation mandates each institution have a cyber security program, Chief Information Security Officer (CISO), access controls, asset management, data governance, software development practices, annual certification of their compliance, and more. As far as regulatory compliance standards, NYCRR 500 is one of the most well written regulations. Many other…

Read More Read More

Automate Least Privilege Access with Resource-Based Groups

Automate Least Privilege Access with Resource-Based Groups

The success of any Data Access Governance program starts with implementing a resource-based groups provisioning workflow by automating the least privilege access model. StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware.   A Resource-Based Group model is the easiest to manage and most suitable for facilitating…

Read More Read More

Market Trends: Preparing Now – EU General Data Protection Regulation (GDPR)

Market Trends: Preparing Now – EU General Data Protection Regulation (GDPR)

At the RSA Conference 2017 in San Francisco, CA we were able to survey more than 300 security professionals. One of the survey questions was, “Is your organization preparing for the EU General Data Protection Regulation (GDPR)?” 67% of respondents said that their organizations were preparing. Regulatory Compliance Standards Regulatory compliance standards such as PCI-DSS, HIPAA, and SOX are simply meant as a baseline for security organizations. Unfortunately, they have set the groundwork for some organizations to partake in compliance-based…

Read More Read More

Top 10 Data Security Sessions at the RSA Conference 2017

Top 10 Data Security Sessions at the RSA Conference 2017

It is that time of year again, time to get our bags packed and head to San Francisco for the RSA Conference. This year’s theme is the Power of Opportunity–which is a fitting theme for most security companies as they move toward partnerships that benefit end users. As a cybersecurity company that focuses on credentials and data, we thought it would be helpful to select a top 10 list of data security sessions for you to attend while at RSA….

Read More Read More