Netwrix and Stealthbits merge to better secure sensitive data. LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Search

Featured Blog

Introducing the Data Privacy Engine

Introducing the Data Privacy Engine

Today, we are introducing a new method to tackle Data Subject Access Requests (DSARs) that will enable our customers to obtain results in seconds. Available as an add-on to complement StealthAUDIT, Data Privacy Engine effectively connects identities with the location of their personal information. Thanks to the pre-discovery of attributes of data subjects across all repositories (structured, unstructured, on-premise, in the cloud, etc.) along with an understanding of which files and tables re…
Understanding Delegated Permissions in Active Directory

Understanding Delegated Permissions in Active Directory

Active Directory Delegated Permissions Overview The importance of Active Directory permissions cannot be understated, the capability for users to write and perform certain actions against your Active Directory can lead to unintended changes, unnecessary risk for attack vectors and lateral movement, or total domain compromise. In this blog, I’ll be going over, at a high level, how Active Directory permissions are applied, and how to view them natively. In the future, I’ll be covering how to…
Global Compliance Demands: The Singaporean Personal Data Protection Act (PDPA) Reviewed

Global Compliance Demands: The Singaporean Personal Data Protection Act (PDPA) Reviewed

| Adam Rosen | | Leave a Comment
The push for data privacy regulation has exploded in recent years, with the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) taking center stage. Gartner predicts  “ By 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations, up from 10% today.” For much of the world, this regulatory shift will have a substantial impact on the way businesses collect and process information. However, organiz…
Data Privacy Trends to Look Out For in 2021

Data Privacy Trends to Watch Out For in 2021

| Farrah Gamboa | | Leave a Comment
Data privacy has become the expectation for every consumer across the globe, becoming more than a set of rules and regulations driven by compliance standards, but rather one of the primary pillars upon which customer loyalty and brand recognition stand upon.  A continuously-developing pandemic, a majority of people working from home, and new data privacy laws regularly – all indications that 2021 will be a huge year for data privacy. COVID-19 Pandemic Leaves a Lasting Impression Th…
Leveraging OpenSSH to Move Files in Windows Server 2019

Leveraging OpenSSH to Move Files in Windows Server 2019

| Sujith Kumar | | Leave a Comment
Having worked with Unix and Linux servers for a long time, one feature that I came to appreciate is the Secure Shell (SSH) daemon.  The SSH server daemon allows users to securely connect to Linux and Unix servers using an SSH client.  Those of you who work with Linux and Unix servers are quite familiar with open-source SSH tools such as Putty and WinSCP.  Personally, I find WinSCP quite helpful as it allows me to transfer files back and forth from my Windows desktop machine to …

Best Practices – Setting up StealthAUDIT SQL Server Database

If you decided to implement StealthAUDIT to meet your data access governance and security needs, then you made the right decision.  StealthAUDIT core requires a SQL Server database to store the audited data, configuration settings, and certain historic data.  In this blog, I will review some of the best practices when it comes to setting up the SQL Server database to be used by StealthAUDIT.  This blog is not intended to replace the StealthAUDIT Installation Guide, but rather s…
5 Data Privacy Best Practices

5 Data Privacy Best Practices

With the enactment of the California Consumer Privacy Act (CCPA) and the ever-evolving COVID-19 pandemic, Data Privacy has been at the forefront in 2020 and will remain an important challenge that organizations must take head-on as the way the world works continues to change. Stringent data privacy controls are an essential measure organizations need to take to not only ensure compliance with data privacy regulations but also to maintain customer trust and loyalty in the expanding digital wor…
What is DNS over HTTPS (DoH) & How to Enable in Windows 10

What is DNS over HTTPS (DoH) & How to Enable in Windows 10

When your web browser accesses a website, it needs to first translate the friendly URL (ex. stealthbits.com) to the public IP address of the server that hosts that website. This is known as a “DNS lookup”, and traditional DNS is unencrypted (unlike modern HTTPS web traffic that’s almost entirely secured via HTTPS these days). Since HTTPS encrypts your communications with websites once you’ve established a connection, you may be wondering why it matters that DNS, the initial lookup of the …
What Are Ephemeral Accounts & How Do They Defend Against Attackers?

What Are Ephemeral Accounts & How Do They Defend Against Attackers?

Privileged Account Management (PAM) software has been around for decades, resulting in many different approaches to securing privileged access to critical assets. Accounts with more access need stronger protection, which is what PAM solutions strive to provide. Over the years PAM software has evolved from simply vaulting passwords to using proxy servers to handle those vaulted passwords, resulting in blurred lines between the distinction of Privileged Account Management and Privileged Acce…
What Comes After the FireEye Attack

What Comes After the FireEye Attack

By now it’s common knowledge that FireEye has disclosed they were the victims of an attack by a nation-state seeking government information. If you aren’t aware of the particulars of this attack, I strongly encourage you to take a few minutes and read the blog posted by the FireEye team. It includes details about the attack and what was compromised, as well as how the company plans to address the situation. In the next few days, we will face a barrage of messages from vendors seeking to re…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!

 

© 2021 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL