5 Cybersecurity Trends for 2019

5 Cybersecurity Trends for 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice of STEALTHbits regarding the future of cybersecurity. So, read on…because you don’t want to miss these wise and insightful opinions on which trends will emerge in…

Read More Read More

Collect and Analyze Relevant Data Points to Assess Risk

Collect and Analyze Relevant Data Points to Assess Risk

The goal of the Collect and Analyze phase is to assess relevant data points to answer critical questions like what’s the sensitivity of the data, who has access to it, who owns it, and what’s the age of that data.  When you begin to understand the answers to these questions, you can then begin prioritizing the resources that are at most risk and limiting access to them as you work towards achieving a Least Privilege Access model.

EU GDPR: Paving the Way for New Privacy Laws?

EU GDPR: Paving the Way for New Privacy Laws?

The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.” In what could end up…

Read More Read More

GDPR–A Crash Course

GDPR–A Crash Course

If you find yourself among the minority that is “ready” I congratulate you, as data privacy will no longer stand still for any of us. And those who find themselves among the majority that is not ready, this is a good time to practice the principle of priority.

Where Real Organizations Are with EU GDPR 10 Days from Launch

Where Real Organizations Are with EU GDPR 10 Days from Launch

I’m writing this sitting in Germany, having spent one week meeting with customers from the UK, Switzerland, and other places and about to spend another at the Kuppinger Cole EIC Conference. The conference agenda is loaded up with EU GDPR topics, and there will be more to say about that in another post. It was very interesting last week to hear from customers, prospects, and partners where their GDPR efforts are right now. With the May 25th date looming, it would be easy to expect…

Read More Read More

A Tale of One City – Data Privacy Day

A Tale of One City – Data Privacy Day

Data Privacy Day is among us, and for that matter so is EU GDPR and NYCRR 500. What do these all have in common? Well, privacy. Privacy by design really should be more than just the mantra of GDPR, it needs to become the mantra of everyone handling any type of customer information. I do have hope that it will. How do you achieve privacy by design? EU GDPR along with NYCRR 500 are both privacy-focused regulations and they both…

Read More Read More

2017 Cybersecurity Recap & 2018 Predictions

2017 Cybersecurity Recap & 2018 Predictions

As we begin to wrap up 2017 and reflect back on the year, we looked at what the industry has accomplished and in some cases where we have fallen short. In the early part of this year many industry thought leaders were stating that 2017 would again be the year of ransomware. They were all very correct in their statements, but this year has shown us much more, it has shown us the increasing need for cybersecurity insurance, data access…

Read More Read More

Market Trends: Risk Based Security – Compliance Based Security – Security Through Obscurity

Market Trends: Risk Based Security – Compliance Based Security – Security Through Obscurity

What Security Strategy is Best For Your Organization? There are some great examples of Chief Executive Officers (CEOs) and Chief Information Security Officers (CISOs) working together towards protecting their employees, customers, and organization. On the other end of the spectrum, you have CEOs and CISOs that do not work well together. In order to evenly align your security strategy with the business’s needs, you have to be able to see eye-to-eye on the key issue of how your organization’s security…

Read More Read More

Data Mapping in the age of GDPR – Unknown Application Workflows

Data Mapping in the age of GDPR – Unknown Application Workflows

When the enemy is already inside Security breaches is a fact of life. Employees click on links in phishing emails, web applications get compromised, weak passwords get guessed, and insiders misuse their privileges. As a matter of fact, internal actors play a role in every 4th breach according to the latest 2017 Data Breach Investigations Report from Verizon (http://www.verizonenterprise.com/verizon-insights-lab/dbir/). Once the enemy is within the external defenses it is critical to protect the internal data and the business operations. Not…

Read More Read More

Prevent Data Theft with File Activity Monitoring

Prevent Data Theft with File Activity Monitoring

Preventing Data Theft with File Activity Monitoring If you ask most folks who pay attention to cybersecurity what the recent big-name breaches and headline-grabbing malware have in common, you would get many answers. Some would say they were next-generation ransomware like NotPetya or WannaCry. Others would say that the HBO and Sony breaches started with a phishing email and ballooned from there. Even more would say that next-generation firewalls should have helped but didn’t. While these are all true, they…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.