Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE


And other things that keep you up at night

Blog >Search

Featured Blog


CSSF 13/554 Decoded

One of the many undeniable facts of the 21st century is that we live in a time of ever-expanding globalization. People everywhere are connected. Events that occur at opposite ends of the earth can make ripples in various places across the entire world. So, when a document from the “Commission de Surveillance du Secteur Financier” in Luxembourg entitled, “Circular CSSF 13/554” (CSSF for short) came across our desks earlier last week, we dove right into it. Finding the translation of the legal …

3 Important Things to Know About the 2013 HIPAA Omnibus Rule

Although the HIPAA Omnibus rule was implemented on March 26th, 2013, businesses everywhere were given roughly 6 months to comply with the new standards. Fast forward 180 days and as it would appear the deadline has passed four days ago, on September 23rd. This means that if you are the member of a company or business in the healthcare industry (or have direct relation to it), and are somehow hearing about this for the first time through me (you’re welcome), it’s probably time to become compli…

Putting Unstructured Data Into Context

WHAT THE ‘COSMOS’ CAN TEACH US ABOUT UNSTRUCTURED DATA How is it that something can be so incredibly large and minutely small at the same time? If you’re as fascinated by natural science as I am, then you’re likely also watching Neil deGrasse Tyson’s reboot of the ‘Cosmos’ series. Maybe it makes you think about planets, our solar system, or maybe our galaxy. You may have thought about it in the opposite direction, in the context of atoms, neutrons, electrons, and protons. Regardless of which …

What the Adobe Data Breach Means for Your Organization

The data breach at Adobe Systems Inc. is turning out to be worse than previously reported. Back in early October, Adobe announced that approximately 3 million accounts were compromised and that these “sophisticated” attacks accessed customer IDs, encrypted passwords, and other personally identifiable information. Additionally, Adobe announced that source code from multiple products had been stolen, including Adobe Photoshop, the widely popular tool for photographers. Fast forward a couple of …
Guy Fawkes

Remember, Remember…

Remember, remember the 5th of November! If you’re a fan of the film “V for Vendetta” or just happened to know a thing or two about history, this phrase likely popped into your head as you looked at the calendar this morning, realizing that today marks the yearly occasion known as Guy Fawkes Day. For those of you that don’t know, this holiday came to be in early England, where a man named Guy Fawkes was arrested on November 5th while taking guard over a pile of explosives that had been planted…

New Year’s Resolutions

As 2013 begins to wrap itself up and the planning for this year’s “wilder-than-last-year” New Year’s Eve Party moves into the execution phase, many will reflect upon the events of the last 365 days. More specifically, people all around the world will ponder whether or not they were, in fact, able to finally accomplish whatever resolution they had previous put before themselves exactly one year ago. Some will look back and have feelings of achievement. Some (many) will look back in sadness and…

Universities a Top Target for Data Theft

While researching data breach incidences within Universities and places of higher education, I stumbled upon the Privacy Rights Clearinghouse; an organization dedicated to consumer privacy and “raising awareness of how technology affects personal privacy”. According to the Privacy Rights Clearinghouse (, over 3,500 data breaches have been made public in US universities and educational institutions alone since 2005; equating to over 600,000,000 compromised…

Why StealthAUDIT?

| Adam Laub | | Leave a Comment
I’m frequently asked why I think StealthAUDIT provides a better alternative to some other product on the market. The answer often comes down to the same core differentiators: StealthAUDIT takes a very different approach to other solutions on the market. While other products attempt to anticipate what reports you might need and package only those into a product set, the StealthAUDIT platform enables a flexible approach to answer virtually ANY question you have today or in the future. The SMP…
Active Directory

Active Directory Tools Versus Native Auditing

| Adam Laub | | Leave a Comment
This is re-posted from an earlier post but seems as relevant as ever. If you’re thinking about monitoring Active Directory events, you’ll no doubt consider what’s involved in leveraging native event logging and how that relates to tools that are designed for AD event monitoring. In that context, below, we describe a few of the steps involved in setting up native event logging for Active Directory. Determine Which Events You Need First, you need to understand which events you need to keep trac…

Active Directory Unification

| Adam Laub | | Leave a Comment
It’s no secret that over the past decade, Active Directory has grown out of control across many organizations. It’s partly due to organizational mergers or disparate Active Directory domains that sprouted up over time, but you may find yourself looking at dozens or even hundreds of Active Directory domains and realize that it’s time to consolidate. And it probably feels overpowering. But despite the effort in front of you, there’s an easy way and a right way. Domain consolidation is not a si…




© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.