Governing Data Access to Meet Security, Compliance and Operational Standards

Governing Data Access to Meet Security, Compliance and Operational Standards

Part 6: Governing Data Access to Meet Security, Compliance and Operational Standards In this 6th and final post of our “Moving from Checkbox Compliance to True Data Security” blog series, we’re going to see how all the work we’ve done in discovering where our data lives, collecting and analyzing relevant information about our data, monitoring activity, and restructuring access rights will pay off in a major way. As you’ve likely gathered already, “Governance” is a pretty important component of a…

Read More Read More

Restructuring Permissions to Achieve a Least Privilege Access Model

Restructuring Permissions to Achieve a Least Privilege Access Model

Part 5: Restructuring Permissions to Achieve a Least Privilege Access Model In part 4 of this 6-part blog series, ‘Moving from Checkbox Compliance to True Data Security,’ we discussed why it’s important to monitor file share activity before you begin to take any action so you can get a full understanding of: Who is leveraging their access privileges What types of operations each user performs Who is creating or contributing the most amount of content If you’ve completed that step and…

Read More Read More

Prioritizing Data Access Governance Initiatives Through Discovery

Prioritizing Data Access Governance Initiatives Through Discovery

Organizations are starting to shift their focus to establish a core set of principles around protecting their data, and they need a blueprint to help them get started. This series serves as the blueprint that will help your organization chart a course to proper data security. The first step in establishing a Data Access Governance program is Discovery.

Moving from Checkbox Compliance to True Data Security

Moving from Checkbox Compliance to True Data Security

Organizations are shifting their focus to a core set of principles around protecting their credentials and data, but they struggle with a starting point. In this 6-part ‘Checkbox Compliance to True Data Security’ blog series, we will provide a foundational blueprint. The series will cover an overview of Data Access Governance (DAG) and introduce the 5 phases that will help shape a true data security program. In an interview with Dark Reading, Brian Christensen, head of global audit for Protiviti…

Read More Read More

The Year of Ransomware: 2017 Recap and 2018 Predictions

The Year of Ransomware: 2017 Recap and 2018 Predictions

The Year of Ransomware Many predicted that 2017 would be the year of ransomware and that was indeed true. This past year the ransomware industry evolved, and the marketplace for ransomware software has grown by 2,502%. Ransomware sales on the dark web have increased from less than $400,000 in 2016 to approximately $6.25 million in 2017. But, this year has shown us much more than just the prevalence of ransomware, it has shown us the increasing need for cybersecurity insurance,…

Read More Read More

5 Essential Steps to EU GDPR – Part 5: GDPR The Ticking Time Bomb

5 Essential Steps to EU GDPR – Part 5: GDPR The Ticking Time Bomb

At the time of writing this blog, there are 378 days, 8 hours until the GDPR comes into force. That’s 54 weeks or approximately 270 weekdays, not considering public holidays. Surely plenty of time to get everything in place and ensure your business is compliant. Right? Wrong! Let me back this up by putting some context around the various elements discussed in the previous blogs in this series. The GDPR Project Obviously, no two organisations are identical so for the sake of…

Read More Read More

5 Essential Steps to EU GDPR – Part 4: STEALTHbits Technologies, a logical fit for EU GDPR

5 Essential Steps to EU GDPR – Part 4: STEALTHbits Technologies, a logical fit for EU GDPR

In part three we discussed how no one person, organisation or vendor has ‘the’ silver bullet to GDPR compliance.  What you need is an array of tools and people to address the many challenges ahead. Saying that not all technical solutions are equal in their value to a GDPR project. Given GDPR is a Data Governance project (as discussed in part two), it makes sense to leverage both technology and people with Data Governance running through their veins STEALTHbits is that….

Read More Read More

5 Essential Steps to EU GDPR – Part 3: Engage the Right People

5 Essential Steps to EU GDPR – Part 3: Engage the Right People

This is arguably the most important element in achieving GDPR compliance. No organisation can do everything independently. Even software vendors must engage with outside agencies on this one. We’re going to discuss ‘the right people’ as two categories; Internal and External. If ever there was an all hands requirement in a project, this is it. Internal Because GDPR is a compliance regulation, it’s far too easy to fall into the trap of believing this is simply a job for the…

Read More Read More

StealthAUDIT 8.0 is Here!

StealthAUDIT 8.0 is Here!

This release marks a major breakthrough in data-centric security with several significant enhancements to our interoperable governance platform. Implementing a consistent least-privilege access model has never been easier! StealthAUDIT 8.0 automates the application of least privilege access control across file systems in bulk and at scale. By converting existing access control lists to a resource-based group security model and revoking excessive privileges, StealthAUDIT programmatically protects data from exfiltration and ransomware. Also new in this release, we’ve added Optical Character Recognition…

Read More Read More

5 Essential Steps to EU GDPR – Part 2: GDPR, the Data Access Governance Project

5 Essential Steps to EU GDPR – Part 2: GDPR, the Data Access Governance Project

In part one we looked at the questions organisations must address when dealing with DSARs (Data Subject Access Request). Simple questions, but in reality, tricky or virtually impossible to answer depending on the size and complexity of your data infrastructure. That said, they’re actually the core premise of Data and Access Governance. What is Data Access Governance (DAG)? DAG is best described as ‘Governing who has access to what’. It’s giving the right people access to the right data in a…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.