Netwrix and Stealthbits merge to better secure sensitive data. LEARN MORE

Stealthbits

Posts by Dan Piazza

Home >Dan Piazza
Dan Piazza is a Technical Product Manager at Stealthbits - now part of Netwrix, responsible for SbPAM as well as File Systems and Sensitive Data in StealthAUDIT. He has worked in technical roles since 2013, with a passion for cybersecurity, data protection, automation, and code. Outside of tech he is an avid runner and enjoys cycling.

Top 5 Things People Hate About PAM

Privilege Account Management (PAM) has been around in some shape or form for decades now. Whether that’s vaulting passwords, session management, reducing privilege, or any combination of privileged management workflows, there’s been no shortage of vendors to choose from. Then why, with such a rich history and breadth of software to choose from, does the […]

Mounting NFS Exports from a Unix Server on Windows 10 or Windows Server

While you’re more likely to be familiar with accessing network file shares via Server Message Block (SMB), or the Windows implementation of SMB (CIFS), the Network File System (NFS) is still prevalent in modern production environments, such as on Unix servers like NetApp ONTAP and Dell EMC Isilon/PowerScale OneFS. Originally designed in 1984 at Sun […]

Scanning for Sensitive Data in Azure Storage (Blobs) with Stealthbits AnyData

The Importance of Cloud Storage – From SMBs to the Enterprise With the release of Version 11.0, StealthAUDIT’s Sensitive Data Discovery tools now include our AnyData connector, which allows users to scan any storage repository for sensitive data. This is an incredibly powerful workflow, as it gives StealthAUDIT users the ability to scan cloud data […]

Detecting Advanced Process Tampering Tactics with Microsoft’s Sysmon 13

| Dan Piazza | Security | Leave a Comment

Sysmon is an important tool within Microsoft’s Sysinternals Suite, a comprehensive set of utilities and tools used to monitor, manage, and troubleshoot the Windows operating system. Per Microsoft’s own definition, Sysmon “provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection […]

What is DNS over HTTPS (DoH) & How to Enable in Windows 10

When your web browser accesses a website, it needs to first translate the friendly URL (ex. stealthbits.com) to the public IP address of the server that hosts that website. This is known as a “DNS lookup”, and traditional DNS is unencrypted (unlike modern HTTPS web traffic that’s almost entirely secured via HTTPS these days). Since […]

What Are Ephemeral Accounts & How Do They Defend Against Attackers?

Privileged Account Management (PAM) software has been around for decades, resulting in many different approaches to securing privileged access to critical assets. Accounts with more access need stronger protection, which is what PAM solutions strive to provide. Over the years PAM software has evolved from simply vaulting passwords to using proxy servers to handle those […]

South Africa’s Protection of Personal Information Act (POPIA) Compliance

| Dan Piazza | Compliance | Leave a Comment

Following in the footsteps of GDPR, CCPA, and LGPD, South Africa’s data privacy law, Protection of Personal Information Act (POPIA), took effect on July 1st, 2020, with an effective date for enforcement of July 1st, 2021. What this means is that affected organizations have a year to prepare and should take advantage of the grace […]

How to Create and Mount NFS Exports on CentOS Linux

| Dan Piazza | File Systems | Leave a Comment

NFS, the Network File System, is a common method for sharing files over a network from a Unix host. In this blog, we’ll go over how to create NFS exports (i.e., shares) on a CentOS 8 host, as well as how to mount those exports from a Linux client. NFS exports are supported on most […]

Malware’s Growth During the COVID-19 Pandemic

| Dan Piazza | Security | Leave a Comment

If recent years have taught us anything about the intent of threat actors, it’s that no victim or circumstance is off limit when there’s a profit to be made. Throughout the year attackers have used COVID-19 to take advantage of victims’ fears of the virus, exploited new attack surfaces resulting from the increase in remote […]

Authentication, Authorization, Single Sign-On, & Federated Identity Explained

Identity and access management (IAM) is a major part of day-to-day enterprise workflows, and with that often comes confusion around authentication, authorization, single sign-on, and federated identity. Let’s break each down in simple terms, which also apply to consumer workflows in addition professional environments. Authentication (AuthN) vs. Authorization (AuthZ) Authentication is confirming a user is […]

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL