Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Uncategorized

Browsed By
Category: Uncategorized

LDAP security monitoring to stop insider threats

LDAP Monitoring for Security

LDAP Monitoring LDAP (Lightweight Directory Access Protocol) is an application protocol for querying and modifying items in directory service providers like Active Directory (AD). AD, by contrast, is a directory services database, and LDAP is one of the protocols you can use to talk to it. Because Microsoft provides no easy way to monitor LDAP queries, to see the query that was issued and where it came from, insider threat actors can leverage this blind spot to perform reconnaissance activit…

5 Essential Steps to EU GDPR – Part 2: GDPR, the Data Access Governance Project

In part one we looked at the questions organisations must address when dealing with DSARs (Data Subject Access Request). Simple questions, but in reality, tricky or virtually impossible to answer depending on the size and complexity of your data infrastructure. That said, they’re actually the core premise of Data and Access Governance. What is Data Access Governance (DAG)? DAG is best described as ‘Governing who has access to what’. It’s giving the right people access to the right data…
RSA Conference 2017 - Top 5 Trends for Security Professionals

5 Trends for Security Professionals

It comes as a surprise to no one that information security pros have strong opinions. So each year STEALTHbits puts out their floor survey and the results come pouring in. 2017 was no exception. We’re excited to announce the “5 Trends for Security Professionals”, which you can get here. This year’s report breaks down 5 trends we saw in the responses and attempts to connect those to the larger threads of thought in the security world today. I won’t steal all the thunder here, but I will give y…

3 Ways to Improve Your Security Posture by Extending IAM into Unstructured Data and PAM

Laying the Groundwork for a Success IAM Deployment Implementing an Identity and Access Management (IAM) solution is a complex undertaking that involves significant investment in time and resources. As a result, project leaders are laser-focused on extending IAM’s footprint to accomplish three goals: Strengthen their security posture Maximize technology value Increase Return on Investment With nearly 80% of Identity and Access Management deployments ending in failure, thes…
5 Essential steps to EU GDPR

5 Essential Steps to EU GDPR

Part 1: Understand the Basic Requirements of GDPR Despite the GDPR being marked as a clearer to understand regulation, it’s still a mine field of legal and compliance requirements, interpretations and uncertainty. The purpose of this blog series is to help you understand the fundamental requirements of GDPR by peeling back the layers of legality, bureaucracy and spin. The Numbers It’s safe to say that the numbers have stolen all of the GDPR headlines: 4% of global revenue or €20m fines …

Cybersecurity: You Cannot Secure What You Cannot See

Shifting the Focus of the Cybersecurity Discussion First, if you have not yet read Joel Brenner’s report, “Keeping America Safe: Toward More Secure Networks for Critical Sectors,” written for the MIT Center for International Studies and the MIT Internet Policy Research Initiative, then you should open another tab right now and go do that. Don’t worry. We’ll wait. The report is not so interesting for breaking new ground, but rather for shifting the focus of the cybersecurity conversation in a…

StealthRECOVER Now Available for Active Directory Rollback and Recovery

AD Rollback and Recovery When I worked as an Active Directory (AD) Architect for over a decade, one of the most challenging tasks I experienced was the inability to easily and safely undo the mistakes administrators and I made. While Microsoft does provide some capabilities for recovering deleted objects with the AD recycle bin, it still does not offer an easy way to rollback and recover from other changes, including rolling back attribute changes for a user or group. For example, have you e…

What’s New in StealthINTERCEPT v4.1?

Staying in lockstep with today’s threats Today we announce the release of StealthINTERCEPT 4.1, the latest iteration of our Real-time Change and Access Auditing solution. For many organizations, monitoring and auditing of their Active Directory (AD), File Systems, and Exchange environments continues to be a challenging endeavor due to the complexity of configuration and overall performance concerns associated with native auditing. Today’s threats continue to evolve in sophistication and spee…

10 Security Risks Almost Everyone Has

| Adam Laub | | Leave a Comment
If you’re responsible for the management and security of an Active Directory (AD) or Windows infrastructure, you already know you’ve got a tough job.  And with thousands of configurations and potential conditions to worry about across dozens of AD and Operating System (OS) versions, where do you even begin an effort to address your most at-risk conditions?  What are they to begin with?  If you’re at a loss, I’d suggest you start right here… Below I’ve listed 10 checks you can perform to high…
RSA Conference 2017

Top 10 Data Security Sessions at the RSA Conference 2017

It is that time of year again, time to get our bags packed and head to San Francisco for the RSA Conference. This year’s theme is the Power of Opportunity–which is a fitting theme for most security companies as they move toward partnerships that benefit end users. As a cybersecurity company that focuses on credentials and data, we thought it would be helpful to select a top 10 list of data security sessions for you to attend while at RSA. Don’t forget to also visit us in the North Hall, Bo…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL