Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Uncategorized

Browsed By
Category: Uncategorized

Sensitive Data Discovery for Compliance

Sensitive Data Discovery for Compliance

| Sujith Kumar | | 1 Comment
The industrial revolution began in the late 18th century and revolutionized the manufacturing process; in a similar manner, the digital revolution happening now is fundamentally changing the way that organizations conduct business. The Digital revolution is all about the digital transformation of how business is conducted in today’s connected world. By migrating data from paper archives to the digital world, businesses can now integrate and utilize relevant data in our day-to-day lives. &nbsp…

Using The Azure Information Protection (AIP) Scanner to Discover Sensitive Data

| Farrah Gamboa | | 1 Comment
Azure Information Protection (AIP) is Microsoft’s solution to classify, label, and protect sensitive documents. The AIP scanner runs as a Windows service and can be used to protect on-premise documents within the following data stores: Local Folders where the scanner service is configuredNetwork shares that use the SMB protocolDocument Libraries and Folders for SharePoint 2013-SharePoint 2019 Figure 1: AIP Scanner Architecture By default, the AIP scanner client uses Windows IFilters …
Advanced Data Security Features for Azure SQL- Part 1 Data Discovery & Classification

Advanced Data Security Features for Azure SQL- Part 1: Data Discovery & Classification

| Farrah Gamboa | | 1 Comment
Azure SQL provides DBA’s with an easy and efficient means of standing up relational database services for their cloud and enterprise applications. As with any database platform, security remains a top concern and has not been overlooked by Microsoft with the variety of security features available in Azure SQL, including those offered through the Advanced Data Security package. The Advanced Data Security package for Azure SQL provides administrators with a single go-to location for discove…
How to Protect Office 365 by Classifying Your Data with Microsoft’s AIP Labels

How to Protect Office 365 by Classifying Your Data with Microsoft’s AIP Labels

| Chris Nieves | | 1 Comment
Azure Information Protection labels or AIP labels can be created and applied to documents and emails. These labels can be used to classify content based on what the data is and how sensitive it is. This approach is extremely powerful when properly implemented as it provides security on your data even after it leaves your environment (if the label allows it to). In this post, I’ll walk through setting up Azure Information protection to use labels to classify and protect your content. Suppor…

2019 Verizon DBIR Key Findings

| Adam Laub | | 1 Comment
Two Trends and Themes Worth Thinking About Why do we all get so excited about the Verizon Data Breach Investigations Report (DBIR) every year? For me, it’s not just the subject matter. It’s mostly the snarky tone and the pop-culture references. Call it what you will, but the injection of humor into an otherwise serious set of findings of our seemingly collective ineptitude makes it at least palatable to read and thus easier to digest. Seriously though, while it’s not all bad, the datase…

5 Cybersecurity Trends for 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice of STEALTHbits regarding the future of cybersecurity. So, read on…because you don’t want to miss these wise and insightful opinions on which trends will emerge in the New Year! Trend #1 – GDPR fines will ma…

EU GDPR: Paving the Way for New Privacy Laws?

The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.” In what could end up being the fir…

Announcing Stealthbits Activity Monitor 3.0 & StealthINTERCEPT 5.1

The Stealthbits team remains keenly focused on delivering world-class activity monitoring and threat analytics solutions to our customers, which is why we are proud to announce the release of Stealthbits Activity Monitor 3.0 and StealthINTERCEPT 5.1. Both of these releases come with several key updates and expanded platform support. Stealthbits Activity Monitor 3.0 The Stealthbits Activity Monitor provides operational efficiencies and visibility into a wide spectrum of human and machine data …

Key Take Aways from the Ponemon 2018 Cost of Insider Threats Report

Since 2016 the Ponemon Institute has released a yearly report on the cost of insider threats, and this year’s report covered some statistics that may surprise you. Most people relate to incidents and breaches that originate from outside the organization. Practitioners, however know that they cannot focus only on the outsider threat but also the threat from insiders and how costly it can be. The Ponemon Institute was able to shine some much needed light on the cost occurred by more than 700 o…

Where Real Organizations Are with EU GDPR 10 Days from Launch

I’m writing this sitting in Germany, having spent one week meeting with customers from the UK, Switzerland, and other places and about to spend another at the Kuppinger Cole EIC Conference. The conference agenda is loaded up with EU GDPR topics, and there will be more to say about that in another post. It was very interesting last week to hear from customers, prospects, and partners where their GDPR efforts are right now. With the May 25th date looming, it would be easy to expect that many wo…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL