Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Search

Featured Blog

Scanning for Sensitive Data in Snowflake with Stealthbits AnyData

Scanning for Sensitive Data in Snowflake with Stealthbits AnyData

Having multiple public/private clouds and data repositories has become ubiquitous in professional environments. For most, gone are the days of storing all data on local filers or even in a limited set of online repositories. The reality is that each organization’s sensitive data is being stored in many cloud databases, object storage repos, SMB implementations, version control, CRM software, and more. These days the list seems to be never-ending – Azure Storage, GitHub, Snowflake, Salesfor…
Top Data Breaches of 2020

Top Data Breaches of 2020

| Farrah Gamboa | | Leave a Comment
This year has been a year like no other, with what seems to be a never-ending and always evolving set of headlines. At a glance, we’ve seen the evolution of the Coronavirus pandemic, the ongoing wildfires across not only the country but the world, the death of a basketball legend, Brexit finally coming to fruition, a civil rights uprising, and so much more.   The state of cybersecurity this year has had just as many ups and downs. While research done by the&nb…
What is the California Privacy Rights Act?

What is the California Privacy Rights Act?

Just days before the enforcement of the California Consumer Privacy Act (CCPA) began on July 1st, 2020, the California Privacy Rights Act (CPRA) received enough signatures to qualify to be on the November ballot. This ballot initiative, also referred to as Prop 24, was drafted by the non-profit organization Californians for Consumer Privacy, and looks to extend and clarify several of the provisions in existing California privacy law.  If this measure is approved, it w…

Where do My Files Sent Using Teams Chat Go?

Do you know what happens when you share a file via a Microsoft Team’s – Team Chat? That file is not just saved in the Teams chat but is also uploaded to either SharePoint or OneDrive depending if the chat was directly with another person or with a Team. In this blog, we will cover the locations that you can access shared files for future use. OneDrive: When sharing a file directly with another person using the Teams chat, the file you send is uploaded to both you and your target user’s …

SERVER (UN)TRUST ACCOUNT

Active Directory persistence through userAccountControl manipulation I’ve been doing some research on group Managed Service Accounts (gMSAs) recently and reading the MS-SAMR protocol specification for some information. I happened to stumble across some interesting information in the userAccountControl section which made us drop what we were doing to test it: Figure 1 – Part of the userAccountControl section of the MS-SAMR specification Effectively, when the UF_SERVER_TRUST_…

ProTip: How to Setup User Activity & Server Logon Scan in StealthAUDIT for Oracle

Now that you have been using StealthAUDIT for Oracle for a while, you might be wondering how to squeeze more value out of the product by enhancing the information it is collecting and reporting on.  StealthAUDIT for Oracle relies on the Oracle Traditional Auditing or Unified Auditing capabilities to collect and report on user activity, as well as successful or unsuccessful server or database logon activity. Neither Traditional Auditing nor …

What is a Data Protection Impact Assessment (DPIA)?

| Farrah Gamboa | | Leave a Comment
Article 35 of the EU General Data Protection Regulation (GDPR) describes the requirement for organizations to “carry out an assessment of the impact of the envisaged processing operations on the protection of personal data”. This process referred to as a Data Protection Impact Assessment (DPIA), is an integral component of the GDPR, and if not carried out when required, can leave an organization open to enforcement action such as potentially steep fines.    In this blog…

What is Privacy by Design?

| Farrah Gamboa | | Leave a Comment
In this era of big data, it is in an organization’s best interest to seek to safeguard their critical data assets, especially sensitive data, to the best of their ability. However, data breaches continue to occur, and according to certain studies, are happening every minute. And now with more consumer data being collected than ever, these breaches pose a real problem not only to an organization’s operations but to their credibility. But imagine if data security, and possibly more importantly …

Data Privacy Essentials: #1 – Don’t Put Your Data at Risk. #2 – Don’t Forget #1

| Adam Rosen | | Leave a Comment
In my last blog, I stated that “data security can be achieved without data privacy, but you can’t effectively fulfill data privacy without data security. When it comes to complying with regulations, or protecting against breaches, if you don’t know your data, you won’t be able to justify it to a regulator, or safeguard it from malicious intent.” Complex, Heterogeneous Data Infrastructure Challenges Once you’ve discovered all the data in your organization, you can then write a report. Ho…

Data Privacy and Security are Two Sides of the Same Coin

| Adam Rosen | | Leave a Comment
Two things can be inherently related, even though they are thought of differently. Examples abound, from tragedy and comedy, to fear and elation. Many pairs just go hand in hand; like privacy and security.   Flipping a coin to resolve a decision will cause one person to win, and the other to lose. The same can be said for data privacy. Without data security, data privacy will be limited at best. The controls over data privacy are juxtaposed with the discovery, classification, access, …

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL