The Importance of Cloud Storage – From SMBs to the Enterprise With the release of Version 11.0, StealthAUDIT’s Sensitive Data Discovery tools now include our AnyData connector, which allows users to scan any storage repository for sensitive data. This is an incredibly powerful workflow, as it gives StealthAUDIT users the ability to scan cloud data […]
Following in the footsteps of GDPR, CCPA, and LGPD, South Africa’s data privacy law, Protection of Personal Information Act (POPIA), took effect on July 1st, 2020, with an effective date for enforcement of July 1st, 2021. What this means is that affected organizations have a year to prepare and should take advantage of the grace […]
NFS, the Network File System, is a common method for sharing files over a network from a Unix host. In this blog, we’ll go over how to create NFS exports (i.e., shares) on a CentOS 8 host, as well as how to mount those exports from a Linux client. NFS exports are supported on most […]
If recent years have taught us anything about the intent of threat actors, it’s that no victim or circumstance is off limit when there’s a profit to be made. Throughout the year attackers have used COVID-19 to take advantage of victims’ fears of the virus, exploited new attack surfaces resulting from the increase in remote […]
Identity and access management (IAM) is a major part of day-to-day enterprise workflows, and with that often comes confusion around authentication, authorization, single sign-on, and federated identity. Let’s break each down in simple terms, which also apply to consumer workflows in addition professional environments. Authentication (AuthN) vs. Authorization (AuthZ) Authentication is confirming a user is […]
It’s often helpful to know which Active Directory groups your current user is a member of when joined to a domain. That information is typically easy to obtain, however you need to know where to look. For many, having a graphical UI is helpful for any task. While this isn’t the quickest way to locate […]
It can be difficult to keep up with all the data privacy regulations across the globe, and failure to comply can result in heavy fines and other punishments. This growth of global data privacy laws represents major progress for consumer rights and gives organizations who comply a chance to earn trust from their customers. This […]
Having multiple public/private clouds and data repositories has become ubiquitous in professional environments. For most, gone are the days of storing all data on local filers or even in a limited set of online repositories. The reality is that each organization’s sensitive data is being stored in many cloud databases, object storage repos, SMB implementations, […]
Europe’s top court, the Court of Justice of the European Union, recently struck down the EU-US data privacy arrangement known as Privacy Shield, which many organizations rely on when transferring data from the EU to the United States. Privacy Shield was enacted in 2016 to replace the Safe Harbor Privacy Principles, which was declared invalid by […]
Azure Information Protection (AIP) is Microsoft’s cloud-based solution for classifying and, optionally, protecting sensitive documents and emails in both cloud and on-prem environments. AIP is a powerful tool (that we’ve discussed before) that can automatically apply labels and encrypt files based on admin-defined rules, and even protect documents after they’ve left an organization’s network. Changes to AIP […]
© 2022 Stealthbits Technologies, Inc.