Netwrix and Stealthbits merge to better secure sensitive data. LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Search

Featured Blog

Understanding Delegated Permissions in Active Directory

Understanding Delegated Permissions in Active Directory

Active Directory Delegated Permissions Overview The importance of Active Directory permissions cannot be understated, the capability for users to write and perform certain actions against your Active Directory can lead to unintended changes, unnecessary risk for attack vectors and lateral movement, or total domain compromise. In this blog, I’ll be going over, at a high level, how Active Directory permissions are applied, and how to view them natively. In the future, I’ll be covering how to…
Global Compliance Demands: The Singaporean Personal Data Protection Act (PDPA) Reviewed

Global Compliance Demands: The Singaporean Personal Data Protection Act (PDPA) Reviewed

| Adam Rosen | | Leave a Comment
The push for data privacy regulation has exploded in recent years, with the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) taking center stage. Gartner predicts  “ By 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations, up from 10% today.” For much of the world, this regulatory shift will have a substantial impact on the way businesses collect and process information. However, organiz…
Data Privacy Trends to Look Out For in 2021

Data Privacy Trends to Watch Out For in 2021

| Farrah Gamboa | | Leave a Comment
Data privacy has become the expectation for every consumer across the globe, becoming more than a set of rules and regulations driven by compliance standards, but rather one of the primary pillars upon which customer loyalty and brand recognition stand upon.  A continuously-developing pandemic, a majority of people working from home, and new data privacy laws regularly – all indications that 2021 will be a huge year for data privacy. COVID-19 Pandemic Leaves a Lasting Impression Th…
Leveraging OpenSSH to Move Files in Windows Server 2019

Leveraging OpenSSH to Move Files in Windows Server 2019

| Sujith Kumar | | Leave a Comment
Having worked with Unix and Linux servers for a long time, one feature that I came to appreciate is the Secure Shell (SSH) daemon.  The SSH server daemon allows users to securely connect to Linux and Unix servers using an SSH client.  Those of you who work with Linux and Unix servers are quite familiar with open-source SSH tools such as Putty and WinSCP.  Personally, I find WinSCP quite helpful as it allows me to transfer files back and forth from my Windows desktop machine to …

Best Practices – Setting up StealthAUDIT SQL Server Database

If you decided to implement StealthAUDIT to meet your data access governance and security needs, then you made the right decision.  StealthAUDIT core requires a SQL Server database to store the audited data, configuration settings, and certain historic data.  In this blog, I will review some of the best practices when it comes to setting up the SQL Server database to be used by StealthAUDIT.  This blog is not intended to replace the StealthAUDIT Installation Guide, but rather s…
5 Data Privacy Best Practices

5 Data Privacy Best Practices

With the enactment of the California Consumer Privacy Act (CCPA) and the ever-evolving COVID-19 pandemic, Data Privacy has been at the forefront in 2020 and will remain an important challenge that organizations must take head-on as the way the world works continues to change. Stringent data privacy controls are an essential measure organizations need to take to not only ensure compliance with data privacy regulations but also to maintain customer trust and loyalty in the expanding digital wor…
What is DNS over HTTPS (DoH) & How to Enable in Windows 10

What is DNS over HTTPS (DoH) & How to Enable in Windows 10

When your web browser accesses a website, it needs to first translate the friendly URL (ex. stealthbits.com) to the public IP address of the server that hosts that website. This is known as a “DNS lookup”, and traditional DNS is unencrypted (unlike modern HTTPS web traffic that’s almost entirely secured via HTTPS these days). Since HTTPS encrypts your communications with websites once you’ve established a connection, you may be wondering why it matters that DNS, the initial lookup of the …
What Comes After the FireEye Attack

What Comes After the FireEye Attack

By now it’s common knowledge that FireEye has disclosed they were the victims of an attack by a nation-state seeking government information. If you aren’t aware of the particulars of this attack, I strongly encourage you to take a few minutes and read the blog posted by the FireEye team. It includes details about the attack and what was compromised, as well as how the company plans to address the situation. In the next few days, we will face a barrage of messages from vendors seeking to re…
South Africa’s Protection of Personal Information Act (POPIA) Compliance

South Africa’s Protection of Personal Information Act (POPIA) Compliance

| Dan Piazza | | Leave a Comment
Following in the footsteps of GDPR, CCPA, and LGPD, South Africa’s data privacy law, Protection of Personal Information Act (POPIA), took effect on July 1st, 2020, with an effective date for enforcement of July 1st, 2021. What this means is that affected organizations have a year to prepare and should take advantage of the grace period to stay ahead of requirements. POPIA is modeled after the EU’s GDPR, as many recent data privacy laws and frameworks have been. By doing so POPIA grants use…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!

 

Loading

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL