Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Compliance

Browsed By
Category: Compliance

Scanning for Sensitive Data in Snowflake with Stealthbits AnyData

Scanning for Sensitive Data in Snowflake with Stealthbits AnyData

Having multiple public/private clouds and data repositories has become ubiquitous in professional environments. For most, gone are the days of storing all data on local filers or even in a limited set of online repositories. The reality is that each organization’s sensitive data is being stored in many cloud databases, object storage repos, SMB implementations, version control, CRM software, and more. These days the list seems to be never-ending – Azure Storage, GitHub, Snowflake, Salesfo…
Top Data Breaches of 2020

Top Data Breaches of 2020

| Farrah Gamboa | | Leave a Comment
This year has been a year like no other, with what seems to be a never-ending and always evolving set of headlines. At a glance, we’ve seen the evolution of the Coronavirus pandemic, the ongoing wildfires across not only the country but the world, the death of a basketball legend, Brexit finally coming to fruition, a civil rights uprising, and so much more.   The state of cybersecurity this year has had just as many ups and downs. While research done by the&n…
Protecting User Credentials - Individual & Software Best Practices

Protecting User Credentials – Individual & Software Best Practices

| Dan Piazza | | Leave a Comment
With the growth of personal data privacy regulations like GDPR and CCPA, it’s clear the tech world is moving towards a Privacy by Design approach when it comes to how organizations store data and design software. While securing sensitive data is a critical concern, it’s also essential that individuals and developers continue to secure the credentials used to access that sensitive data. This may seem obvious, however, a recent KPMG advisory shows that while 75% of Americans consider it ris…
What is the California Privacy Rights Act?

What is the California Privacy Rights Act?

Just days before the enforcement of the California Consumer Privacy Act (CCPA) began on July 1st, 2020, the California Privacy Rights Act (CPRA) received enough signatures to qualify to be on the November ballot. This ballot initiative, also referred to as Prop 24, was drafted by the non-profit organization Californians for Consumer Privacy, and looks to extend and clarify several of the provisions in existing California privacy law.  If this measure is approved, it …
Using & Securing Remote Desktop Protocol (RDP)

Using & Securing Remote Desktop Protocol (RDP)

| Dan Piazza | | Leave a Comment
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, allowing users to remotely connect to Windows workstations and servers. RDP is included in most versions of Windows, going as far back as Windows NT 4.0, and doesn’t come with additional costs or licensing requirements. In Windows networks, this means organizations don’t need to pay for third-party software like TeamViewer, LogMeIn, or AnyDesk in order to enable their users with remote access capabilities. As …

How to Install TLS/SSL Certificates in NetApp Clustered Data ONTAP

| Dan Piazza | | Leave a Comment
HTTPS has definitively become the default and expected method for internet and web app communications that transmit sensitive data, taking the place of the insecure HTTP. TLS, the successor protocol to SSL, is the backbone to HTTPS and encrypts connections so transmitted sensitive information can’t be intercepted or modified. Besides obvious application in internet communications, HTTPS should be used with local web applications that transmit data like credentials, activity events, sensit…

Zerologon: From Zero to Hero – Part 3

| Kevin Joyce | | Leave a Comment
Stealthbits’ Zerologon Detection and Mitigation Solution In my two previous blogs, we’ve gone over the new patch and update plans from Microsoft (Part 1), as well as the attack itself (Part 2). Now let’s talk about how we at Stealthbits can help. We’re actively working in the lab and investigating ways we can audit, detect, and potentially mitigate the Zerologon vulnerability. Check out the updates for each of our products below and see how they can help or what we have in the works! A…

Zerologon: From Zero to Hero – Part 2

| Kevin Joyce | | Leave a Comment
How Does it Work? In Part 1 of this blog series (What is Zerologon?), we discussed how Zerologon exploits a vulnerability in NetLogon that allows a malicious actor on your network to take over a Domain Controller (DC), and eventually your entire domain. Now let’s dive into the specifics of how Zerologon works. Using Mimikatz to Execute the Zerologon Exploit For starters, you can easily identify if a target domain controller is vulnerable to the Zerologon exploit with Mimikatz by run…

Zerologon: From Zero to Hero – Part 1

| Kevin Joyce | | Leave a Comment
What is Zerologon? Zerologon exploits a vulnerability in NetLogon that allows a malicious actor on your network to take over a Domain Controller (DC), and eventually your entire domain. Since this attack requires no authentication and only network access, it has been given a CVSS score of 10.0 (the highest score available). At a high level, an unauthenticated attacker is able to use NetLogon Remote Protocol to connect to a Domain Controller and change the DC password to something they kno…

Is Privileged Access Management in Need of a Fresh New Approach?

Software products to address privileged access have been around for 20 years. From Password Vaulting to Proxy Servers to Dedicated Administrative Accounts, popular Privileged Access Management (PAM) products are overly expensive and complicated. Many of the current PAM solutions available were first developed more than a decade ago and are based on antiquated architectures and years of code bloat that over-complicate even the simplest of tasks. Don’t get me started o…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!

 

Loading

© 2020 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL