Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE

Stealthbits

Posts by Jeff Hill

Home >Jeff Hill

Locking the Vault with IAM Visibility

| Jeff Hill | Uncategorized | Leave a Comment

Imagine a large bank. Security cameras continuously and meticulously record every movement in the bank lobby, employees’ offices, entrances and exits, and even in the custodial supplies storage area. Access to these areas is carefully monitored and controlled via restricted badges and other means. But there’s not a single camera in the vault where the […]

Need Access to Sensitive Information? Just Ask!

| Jeff Hill | Uncategorized | Leave a Comment

My mom always said it never hurts to ask, and it looks like the Magnolia Healthcare hacker’s mom did so as well. I gotta admit, as a hacker, you work hard for your ill-gotten booty. You meticulously design phishing emails so realistic that victims can’t help but be enticed to click on the poisonous links. […]

The Easiest Blog I’ve Ever Written

| Jeff Hill | Uncategorized | Leave a Comment

British Prime Minister Benjamin Disraeli famously said, “There are three kinds of lies: lies, damned lies, and statistics.” In the enterprise software security world, one of those regularly-quoted statistics is that authentication-based attacks factored into about four of every five breaches involving hacking (2012 Verizon Data Breach Report). Indeed, here at STEALTHbits, we use it […]

Sex and Spear Phishing

| Jeff Hill | Uncategorized | Leave a Comment

On the heels of NFL divisional playoff weekend, a football analogy may be in order. We football fans love the 50-yard pass. It’s exciting. It showcases the extraordinary athleticism of both the receivers and the cornerbacks tasked with defending the nearly indefensible. It’s sexy. But the consensus among football coaches is that games are won […]

Is Your Data Overly Sensitive?

| Jeff Hill | Uncategorized | Leave a Comment

Here’s a line I’m sure our competitors would like to take out of context: STEALTHbits is not in the business of protecting data. We’re actually in the business of protecting sensitive data. Of course, this may be a distinction without a difference. In today’s data security environment, it seems like just about everything could be […]

Who’s In My Mailbox?

| Jeff Hill | Uncategorized | Leave a Comment

Understanding who is opening another user’s mailbox is an integral Compliance requirement within any regulated institution. Whether Security needs to monitor executive mailboxes for users probing for information on confidential material, or find the Exchange administrators taking advantage of their elevated mailbox support rights, it is pertinent to have a single consolidated view that highlights […]

Data vs. Information

| Jeff Hill | Uncategorized | Leave a Comment

The Securities and Exchange Commission is responsible for, among other duties, enforcing insider trading laws. In so doing, it needs to know which trades are suspiciously profitable and warrant investigation, and which are routine. In other words, they need valuable information. Each day, millions of securities trades are completed, and each one is meticulously recorded […]

Stealthbits vs. Varonis Without the Hyperbole

Let’s face it. Varonis has smart people. Stealthbits has smart people. Varonis doesn’t have super-secret technology that only their smart people can develop, and neither does Stealthbits. The difference between the two solutions lies in corporate history, market philosophy, and, frankly, a real-time security capability Varonis simply doesn’t offer. History History is powerful. The remnants […]

Who. When. What

In the original Wall Street movie (1987), an ambitious Bud Fox (Charlie Sheen) literally buys an office building cleaning company so he can gain access to sensitive, nonpublic information on which he can profit from illegal stock trades. He dons a cleaning company supervisor uniform, brings a small camera and hand-held portable copier, and begins […]

Taking Insider Threat as Serious as the FBI and DHS

| Jeff Hill | Uncategorized | Leave a Comment

This week the FBI and DHS issued a “Public Service Announcement” about insider threat. I’ve written a lot about insider threat over the years. It’s always been something that needs more focus and attention than it gets. In part, this is because it doesn’t make as sexy a headline as “Hacker Steals Everything!!!” Certainly, there […]

  • 1
  • 2

Subscribe

DON'T MISS A POST. SUBSCRIBE TO THE BLOG!

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL