Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Podcasts

Browsed By
Category: Podcasts

2017 Cybersecurity Recap & 2018 Predictions – Insider Threat Podcast #13

In our thirteenth edition of the Insider Threat Podcast, we were joined by my Stealthbits teammates, Adam Laub, the Senior Vice President of Product Marketing, and Gabriel Gumbs, VP of Product Strategy. We discussed our 2017 Cybersecurity Recap & 2018 Predictions Report, and tried to focus on the prediction part of things since we are at the start of the new year. After a quick look over the shoulder at the trends we spotted in 2017, we move Insider Threat Podcast through to the predictio…

StealthAUDIT 8.1 – Insider Threat Podcast #12

| Jonathan Sander | | Leave a Comment
In our twelfth edition of the Insider Threat Podcast, we were joined by my Stealthbits teammate, Adam Laub, the Senior Vice President of Product Marketing. In a reversal of the typical flow of things, Adam had questions for me. With the release of StealthAUDIT 8.1 fast approaching, he wanted to know how some of the headline features fit into the view of the world from an insider threat perspective. 8.1 is a minor release, and, as is usual with a minor release, most of what is in it is there b…

StealthDEFEND – Insider Threat Podcast #11

| Jonathan Sander | | Leave a Comment
In our eleventh edition of the Insider Threat Podcast, we were joined by my STEALTHbits teammates, Adam Laub, the Senior Vice President of Product Marketing and Dan McLaughlin, Technical Product Manager. Dan and Adam are the dynamic duo that helped usher out our release of StealthDEFEND version 1. StealthDEFEND is our new real-time threat analytics and alerting component of STEALTHbits’ Data Access Governance suite. Focused on file activity, important contextual elements like data sensitivity…
Insider Threat Podcast

NetApp ONTAP v9.3 with Justin Parisi – Insider Threat Podcast #10

In our tenth edition of the Insider Threat Podcast, we were joined by NetApp Senior Technical Marketing Engineer, Justin Parisi. Justin is making the rounds ahead of the NetApp ONTAP version 9.3 release this week. Of course, we wanted to get the conversation focused on insider threats and other security topics. We managed to do just that. It seems ONTAP has a few good security related tricks up its sleeve in version 9.3. We also talked about a common topic for both STEALTHbits and NetApp – ra…

Stealthbits at Microsoft Ignite 2017 – Insider Threat Podcast #8

In our eight edition of the Insider Threat Podcast, we spoke with the most senior member of the Stealthbits team, Adam Laub. Adam had just been to the Microsoft Ignite conference and brought us some insight into what the pulse of the show was. We brought our new focus on Threat Protection to the show in a big way. People’s reactions were very positive. We had more people stopping by and spending time with us than ever before. Of course, there were many things for them to do with our Capture t…
Insider Threat Podcast

The Active Directory Attacks Training Series with Randy Franklin Smith – Insider Threat Podcast #7

| Jonathan Sander | | Leave a Comment
In our seventh edition of the Insider Threat Podcast, once again we spoke with our resident white hat hacker, Jeff Warren. We’ve just partnered with Randy Franklin Smith at Ultimate Windows Security to deliver some of Randy’s “real training for free” on detecting and mitigating Active Directory (AD) attacks from our ongoing blog series. I’ve worked with Randy for years and we have a good relationship, but Jeff and he have been having a lot of fun geeking out with these AD Attacks. If you’r…
Insider Threat Podcast

Active Directory Permissions Attacks – Insider Threat Podcast #4

In our fourth edition of the Insider Threat podcast, we have our favorite guest Jeff Warren on to discuss the latest in the AD attack series of blog posts. These attacks are always fascinating, but this one must be the most interesting yet. These attack vectors are simultaneously obscure and powerful. Most attackers aren’t sophisticated enough to leverage AD permissions in these ways, but those that are rank as the most dangerous. We started with a simple definition of what these AD permissio…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL