Every year Verizon produces the Data Breach Investigations Report (DBIR). It’s bad form on a blog to say “stop reading my content and go read this other content,” but I’ll start by saying that if you’ve never used this report as an asset in your security planning you should absolutely drop everything and go read […]
When I first started at STEALTHbits, times were different. Technology was different. There were different problems to solve then. And with the advent and evolution of an endless stream of new technologies over the past decade from mobile devices to social media, Voice-over-IP (VoIP) to “big data”, the problems to solve keep on coming. Not […]
At this year’s RSA Conference 2014 in San Francisco, Gary S. Miliefsky of Cyber Defense Magazine (CDM) visited the STEALTHbits booth where we got to talking about who STEALTHbits is, what we do, and what we were talking with conference attendees about at the show. Here’s what Gary had to say about STEALTHbits in his […]
The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT security organization formed in 2001. In this article, we review the 2013 edition of this popular security resource. The OWASP Top 10 Is Revised Every Three Years OWASP aims […]
WHAT THE ‘COSMOS’ CAN TEACH US ABOUT UNSTRUCTURED DATA How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about […]
I’m frequently asked why I think StealthAUDIT provides a better alternative to some other product on the market. The answer often comes down to the same core differentiators: StealthAUDIT takes a very different approach to other solutions on the market. While other products attempt to anticipate what reports you might need and package only those […]
This is re-posted from an earlier post but seems as relevant as ever. If you’re thinking about monitoring Active Directory events, you’ll no doubt consider what’s involved in leveraging native event logging and how that relates to tools that are designed for AD event monitoring. In that context, below, we describe a few of the […]
It’s no secret that over the past decade, Active Directory has grown out of control across many organizations. It’s partly due to organizational mergers or disparate Active Directory domains that sprouted up over time, but you may find yourself looking at dozens or even hundreds of Active Directory domains and realize that it’s time to […]
One of the most important things you can do to improve the security posture of your IT infrastructure is to provide in-depth monitoring of Active Directory. STEALTHbits provides numerous solutions to assist with monitoring numerous Active Directory security events. With deep visibility into administrative changes such as user account creations, group changes, and changes to […]
LOST IN A HOT AIR BALLOON A man piloting a hot air balloon is hopelessly lost. He descends to a lower altitude and locates a man down on the ground. He lowers the balloon and shouts, “excuse me, can you tell me where I am?” The man below states, “yes, you’re in a hot air […]
Start a Free Stealthbits Trial!
No risk. No obligation.