Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE


Posts by Adam Laub

Home >Adam Laub
As General Manager, Adam is responsible for product lifecycle and market adoption from concept to implementation through to customer success. He is passionate about market strategies, and developing long-term path for success for our customers and partners. Previously, Adam served as CMO and has held a variety of senior leadership positions at Stealthbits - now part of Netwrix including Sales, Marketing, Product Management, and Operational Management roles where his focus has consistently been setting product strategy, defining roadmap, driving strategic engagements and product evangelism. Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Increased Focus on Insider Threat from the Verizon DBIR in 2014 – Who Do You Trust?

Every year Verizon produces the Data Breach Investigations Report (DBIR). It’s bad form on a blog to say “stop reading my content and go read this other content,” but I’ll start by saying that if you’ve never used this report as an asset in your security planning you should absolutely drop everything and go read […]

Don’t Call It a Comeback

When I first started at STEALTHbits, times were different. Technology was different. There were different problems to solve then. And with the advent and evolution of an endless stream of new technologies over the past decade from mobile devices to social media, Voice-over-IP (VoIP) to “big data”, the problems to solve keep on coming. Not […]

RSA Conference 2014 Recap: Mission Accomplished

At this year’s RSA Conference 2014 in San Francisco, Gary S. Miliefsky of Cyber Defense Magazine (CDM) visited the STEALTHbits booth where we got to talking about who STEALTHbits is, what we do, and what we were talking with conference attendees about at the show. Here’s what Gary had to say about STEALTHbits in his […]

The OWASP Top 10: Then and Now

| Adam Laub | Uncategorized | Leave a Comment

The OWASP Top 10 list publicizes the most critical web application security flaws as determined by Open Web Application Security Project (OWASP), a nonprofit, vendor-independent IT security organization formed in 2001. In this article, we review the 2013 edition of this popular security resource. The OWASP Top 10 Is Revised Every Three Years OWASP aims […]

Putting Unstructured Data Into Context

WHAT THE ‘COSMOS’ CAN TEACH US ABOUT UNSTRUCTURED DATA How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about […]

Why StealthAUDIT?

| Adam Laub | Uncategorized | Leave a Comment

I’m frequently asked why I think StealthAUDIT provides a better alternative to some other product on the market. The answer often comes down to the same core differentiators: StealthAUDIT takes a very different approach to other solutions on the market. While other products attempt to anticipate what reports you might need and package only those […]

Active Directory Tools Versus Native Auditing

| Adam Laub | Uncategorized | Leave a Comment

This is re-posted from an earlier post but seems as relevant as ever. If you’re thinking about monitoring Active Directory events, you’ll no doubt consider what’s involved in leveraging native event logging and how that relates to tools that are designed for AD event monitoring. In that context, below, we describe a few of the […]

Active Directory Unification

| Adam Laub | Uncategorized | Leave a Comment

It’s no secret that over the past decade, Active Directory has grown out of control across many organizations. It’s partly due to organizational mergers or disparate Active Directory domains that sprouted up over time, but you may find yourself looking at dozens or even hundreds of Active Directory domains and realize that it’s time to […]

Active Directory Monitoring

| Adam Laub | Uncategorized | Leave a Comment

One of the most important things you can do to improve the security posture of your IT infrastructure is to provide in-depth monitoring of Active Directory. STEALTHbits provides numerous solutions to assist with monitoring numerous Active Directory security events. With deep visibility into administrative changes such as user account creations, group changes, and changes to […]

Timeless Information Technology (IT) Joke

LOST IN A HOT AIR BALLOON A man piloting a hot air balloon is hopelessly lost. He descends to a lower altitude and locates a man down on the ground. He lowers the balloon and shouts, “excuse me, can you tell me where I am?” The man below states, “yes, you’re in a hot air […]



© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.