Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Uncategorized

Browsed By
Category: Uncategorized

Cleanup Part 1

A Deeper Dive into Active Directory Optimization – Part 1

AD Cleanup – A Place for Everything, and Everything in its Place Occasionally, it pays to get some extra husband points, so last week I decided to spend some time downstairs with my kids cleaning up their playroom. My wife and I were both tired of picking our way along the different toys, DVD cases, pillows, and little kid chairs, and somehow it had gotten messy *again* – it was my turn to herd cats and “help” the kids get it cleaned up. There were toys on the floor, bins full of mismatched …
Financial

Insider Threat Analysis Can Prevent Financial & Reputation Damage

Ted is an application developer who lost his job in the IT sector due to company downsizing. Ted was displeased at being laid off just before Christmas, and expressed his displeasure by launching a systematic attack on his former company’s network. Three weeks following his termination, the insider used the username and password of his colleague to gain remote access to the network and modify several of the company’s files, web pages, and customer information. He also sent an email to …
Heartbleed

Heartbleed. This is real. And it’s happening now.

The “heartbleed” bug recently discovered is the type of bug that security experts often discuss within the context of doomsday scenarios but truly never want to experience. The bug isn’t platformed specific; e.g. Patch Tuesday – Windows “fixes”; this bug targets the very fabric of secure communications across the Internet and all of those “things” that communicate across it. The flaw at its very fundamental level steals information from SSL/TLS encrypted communications which is a core secu…
Open Door

Closing Gaps in Privileged Identity Management Programs

You can call it PIM (Privileged Identity Management); you can call it PAM (Privileged Account Management); you can call it PUM (Privileged User Management). The one thing you can’t call it is boring. I’ll go with PIM for now. It seems every customer we’re speaking to either has a PIM solution in place, is rolling one out, or is trying to find one. Considering the way auditors have been giving so much attention to administrative rights, this is no surprise. If you have IT systems, you have adm…

All About AGDLP Group Scope for Active Directory – Account, Global, Domain Local, Permissions

Lately I’ve gotten a few questions from prospective clients about AD security group scope. I wanted to take a minute to give an overview of what group scopes are and why they’re meaningful. I’ll also talk a little bit about Microsoft’s best practice models for using group scope and discuss some of the positives and negatives of each. Group scope is important to understand if you want to effectively control risks in how you use AD groups. The scope of a group determines where the group can be…
Radar

Insider Threat Detection

As media outlets broadcast security breaches with household names like Target and Home Depot, hundreds of less-famous breaches are occurring every day. Most of these have one thing in common; they come from the inside. As a result, IT organizations and the industry at large are beginning to shift their threat mitigation strategies. One such recent shift occurred when Microsoft drew attention to a small Israeli startup, Aorato. The promise of threat detection technology that sees insider be…

AD Optimization and IAM

From the vantage point that most people have, even technical folks, Active Directory (AD) seems like it’s doing pretty well. How often can you not log in when you sit down at your PC? How often do you fail to find someone in the corporate directory in Outlook? How many times have you heard of an AD outage? Of course, those close to AD know this is an illusion. AD has so many layers of failure resistance, it’s natural that it doesn’t show any cracks in day-to-day operations. That’s why when…
Newspaper

Insider Threat is so important it will never make headlines

Right now the headlines in the security world are on fire with hacks and breaches. There is a nasty number brewing at DHS involving federal employees, and there is the alleged largest hack of username and password data ever as well. I say “alleged” because some in the security world have called some of the numbers being thrown around into question and I think they make some good points. Much of this has made it into mainstream news. People will be doing the Heartbleed dance and changing all t…
Keyboard

The Link Between Copy & Paste and a Potential Data Breach Drives DAG

One of the continually fascinating parts of my job is talking to customers and understanding how they decide to pursue some goals over others. Last week I had the chance to sit with a modest size department of a fairly large city. They have just brought on a new CIO and his top priority item is Data Access Governance (DAG). How did that become his top priority? The story his team told me was funny and scary at the same time. They are in the middle of a big project to clean up their citizen re…
Dice

Effective Risk Reduction

Risk reduction is often associated with prevention only. Effective security, however, also needs detection and response. Those three (prevention, detection, response) are the fundamental pieces of the process oriented approach to IT security, which allows us to effectively reduce the risk and is the subject of this article. Risk and Countermeasures Let’s assume that the risk has been identified. Then the decision about risk handling needs to be made. The risk can be: a) reduced (counterm…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL