We’re in the midst of training week for our sales for here at STEALTHbits. That means repeating many ideas we want to be sure they understand and they will help our potential customers understand. One of the facts that we often quote is the 800% increase expected in the next 5 years, which is an […]
2015 Second Annual Data Breach Industry Forecast – Experian Stats/Quotes: “You’re going to be hacked. Have a plan.” – Joseph Demarest, Assistant Director of the FBI Cyber Division More than 500 million financial records have been stolen by hackers in the past 12 months – attributed to Joseph Demarest, Assistant Director of the FBI Cyber […]
With all the attention the world can muster for information security squarely focused on Sony Pictures Entertainment, a small but significant breach went mostly unnoticed at Morgan Stanley right at the end of last year. In case you have not heard about it, you can read about it here. There are a couple interesting things […]
The best way to tell the difference between a threat and a risk is to ask a simple question: can I control it? The reason is that a threat always comes from the outside, while a risk is exposed from the inside. Just think about the way we talk about them. Someone “takes a risk” […]
Selection bias often leads us to pick out details that are advantageous for us. The classic example: soon after buying a new car one begins to seemingly see that car and that make of car much more often. You don’t actually see it more often, but you notice it more often. When I was at […]
I’ve been to dozens of conferences over the past decade, but this year’s Gartner IAM Summit was perhaps the most interesting and educational event I’ve been to. One of the things that makes the IAM Summit so great every year is its intense focus on a single subject; Identity & Access Management. While there are […]
Ted is an application developer who lost his job in the IT sector due to company downsizing. Ted was displeased at being laid off just before Christmas, and expressed his displeasure by launching a systematic attack on his former company’s network. Three weeks following his termination, the insider used the username and password of his […]
The “heartbleed” bug recently discovered is the type of bug that security experts often discuss within the context of doomsday scenarios but truly never want to experience. The bug isn’t platformed specific; e.g. Patch Tuesday – Windows “fixes”; this bug targets the very fabric of secure communications across the Internet and all of those “things” […]
You can call it PIM (Privileged Identity Management); you can call it PAM (Privileged Account Management); you can call it PUM (Privileged User Management). The one thing you can’t call it is boring. I’ll go with PIM for now. It seems every customer we’re speaking to either has a PIM solution in place, is rolling […]
As media outlets broadcast security breaches with household names like Target and Home Depot, hundreds of less-famous breaches are occurring every day. Most of these have one thing in common; they come from the inside. As a result, IT organizations and the industry at large are beginning to shift their threat mitigation strategies. One such […]
© 2022 Stealthbits Technologies, Inc.