The industrial revolution began in the late 18th century and revolutionized the manufacturing process; in a similar manner, the digital revolution happening now is fundamentally changing the way that organizations conduct business. The Digital revolution is all about the digital transformation of how business is conducted in today’s connected world. By migrating data from paper archives to the digital world, businesses can now integrate and utilize relevant data in our day-to-day lives.  …
Azure Information Protection (AIP) is Microsoft’s solution to classify, label, and protect sensitive documents. The AIP scanner runs as a Windows service and can be used to protect on-premise documents within the following data stores:
Local Folders where the scanner service
is configuredNetwork shares that use the SMB
protocolDocument Libraries and Folders for
SharePoint 2013-SharePoint 2019
Figure 1: AIP Scanner Architecture
By default, the AIP scanner client uses Windows IFilters …
Azure SQL provides DBA’s with an easy and efficient means of standing up relational database services for their cloud and enterprise applications. As with any database platform, security remains a top concern and has not been overlooked by Microsoft with the variety of security features available in Azure SQL, including those offered through the Advanced Data Security package.
Advanced Data Security package for Azure SQL provides administrators with a
single go-to location for discove…
Azure Information Protection labels or AIP labels can be created and applied to documents and emails. These labels can be used to classify content based on what the data is and how sensitive it is. This approach is extremely powerful when properly implemented as it provides security on your data even after it leaves your environment (if the label allows it to). In this post, I’ll walk through setting up Azure Information protection to use labels to classify and protect your content.
Data Classification Definition
Classification is the process of categorizing datasets (e.g. files,
databases, etc.) into logical groupings that makes what’s inside the data instantly
understandable and contextual on the surface.
In other words, it’s labeling. As a practical example, instead of having to open a file to examine its content and determine there’s sensitive data inside, a classification could be applied to one of the file’s available metadata tags to denote the content…
Two Trends and Themes Worth Thinking About
Why do we all get so excited about the Verizon Data Breach Investigations Report (DBIR) every year? For me, it’s not just the subject matter. It’s mostly the snarky tone and the pop-culture references. Call it what you will, but the injection of humor into an otherwise serious set of findings of our seemingly collective ineptitude makes it at least palatable to read and thus easier to digest.
Seriously though, while it’s not all bad, the datase…
As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going!
Like the last few years, we made our way
around the office with left over holiday cookie bribes to get the voice of
STEALTHbits regarding the future of cybersecurity. So, read on…because you
don’t want to miss these wise and insightful opinions on which trends will
emerge in the New Year!
Trend #1 – GDPR fines will ma…
The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.”
In what could end up being the fir…
The Stealthbits team remains keenly focused on delivering world-class activity monitoring and threat analytics solutions to our customers, which is why we are proud to announce the release of Stealthbits Activity Monitor 3.0 and StealthINTERCEPT 5.1. Both of these releases come with several key updates and expanded platform support.
Stealthbits Activity Monitor 3.0
The Stealthbits Activity Monitor provides operational efficiencies and visibility into a wide spectrum of human and machine data …
Since 2016 the Ponemon Institute has released a yearly report on the cost of insider threats, and this year’s report covered some statistics that may surprise you. Most people relate to incidents and breaches that originate from outside the organization. Practitioners, however know that they cannot focus only on the outsider threat but also the threat from insiders and how costly it can be.
The Ponemon Institute was able to shine some much needed light on the cost occurred by more than 700 o…