Stealthbits

Posts by Dan Piazza

Home >Dan Piazza
Dan Piazza is a Technical Product Manager at Stealthbits Technologies, responsible for File Systems and Sensitive Data in StealthAUDIT. He has worked in technical roles since 2013, with a passion for cybersecurity, data protection, data storage, and automation. He has a Bachelor’s degree from Bryant University, and outside of tech he enjoys running, tennis, and snowboarding.

Scanning for Sensitive Data in Snowflake with Stealthbits AnyData

Having multiple public/private clouds and data repositories has become ubiquitous in professional environments. For most, gone are the days of storing all data on local filers or even in a limited set of online repositories. The reality is that each organization’s sensitive data is being stored in many cloud databases, object storage repos, SMB implementations, […]

Protecting User Credentials – Individual & Software Best Practices

| Dan Piazza | Security | Leave a Comment

With the growth of personal data privacy regulations like GDPR and CCPA, it’s clear the tech world is moving towards a Privacy by Design approach when it comes to how organizations store data and design software. While securing sensitive data is a critical concern, it’s also essential that individuals and developers continue to secure the […]

Using & Securing Remote Desktop Protocol (RDP)

| Dan Piazza | Security | Leave a Comment

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, allowing users to remotely connect to Windows workstations and servers. RDP is included in most versions of Windows, going as far back as Windows NT 4.0, and doesn’t come with additional costs or licensing requirements. In Windows networks, this means organizations don’t need to […]

How to Install TLS/SSL Certificates in NetApp Clustered Data ONTAP

| Dan Piazza | Security | Leave a Comment

HTTPS has definitively become the default and expected method for internet and web app communications that transmit sensitive data, taking the place of the insecure HTTP. TLS, the successor protocol to SSL, is the backbone to HTTPS and encrypts connections so transmitted sensitive information can’t be intercepted or modified. Besides obvious application in internet communications, […]

How to Join Linux Hosts to Active Directory Using realmd & SSSD

This blog uses apt commands in its examples (for Debian-based distros like Ubuntu, Kali, Mint, etc.), however, examples have also been tested with yum/dnf commands (for RPM-based distros like CentOS, Red Hat, Fedora, openSUSE, etc.). A Very Brief Summary of Linux With Active Directory When joining a Linux host to Active Directory (AD), two components […]

The Growth of Global Data Privacy Laws – Beyond GDPR & CCPA

| Dan Piazza | Compliance | Leave a Comment

The push for data privacy has exploded in recent years, with regulations such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) leading the charge. This means consumers around the globe are gaining rights regarding how their data is collected, stored, and sold, as well as more ways to hold companies accountable when […]

Data Subject Access Requests (DSAR) – How to Prepare & Respond

| Dan Piazza | Compliance | Leave a Comment

A term popularized by the EU’s General Data Protection Regulation (GDPR), a Data Subject Access Request, also known as a DSAR, is an individual’s right to request information on personally identifiable information (PII) an organization has gathered about them, how that organization is using that data, and who that data has been shared with. PII […]

Types of Azure Storage: Blobs, Files, Queues, Tables, & Disks

Azure Storage is Microsoft’s cloud platform for scalable, modern data storage. If the number of options overwhelms you, then keep reading. Each Azure storage offering will be broken down into simple terms, while also addressing other things to consider when choosing a solution. To make things easier for users, Azure Storage offerings are: Cloud-based Durable […]

NIST Password Guidelines in 2020

| Dan Piazza | Compliance | Leave a Comment

What are NIST Password Guidelines? Since 2014, the National Institute of Standards and Technology (NIST, a U.S. federal agency) has issued requirements and controls for digital identities, including authentication, passwords (known as “memorized secrets”), and more via Special Publication 800-63B. The latest revision (rev. 3) was released in 2017, with updates as recent as 2019. […]

EU-US Privacy Shield Revoked: What This Means for EU-US Commercial Data Transfers

Europe’s top court, the Court of Justice of the European Union, recently struck down the EU-US data privacy arrangement known as Privacy Shield, which many organizations rely on when transferring data from the EU to the United States. Privacy Shield was enacted in 2016 to replace the Safe Harbor Privacy Principles, which was declared invalid by […]

  • 1
  • 2

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2020 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL