With Security Weekly, we talk about the lack of visibility and protection of Active Directory and unstructured data repositories, as well as the various controls that are needed to govern and secure data and credentials from the most popular attacks in order to prevent a successful attack or breach. Our team has joined Paul Asadoorian on the show many times to share our knowledge about the latest information security news, Active Directory for all it’s glory and security shortcomings, file systems, data access governance and threat detection and protection.
In this webinar, Gabriel Gumbs from STEALTHbits and Clayton Fields from Javelin Networks join Paul Asadoorian to talk about how Active Directory is setup, why it's innately insecure, and why this is a major security problem for organizations today. Since organizations are still not doing basic AD housekeeping to keep it secure, Paul walks through the 7 things IT administrators should do at minimum to protect Active Directory.
Click here to register for this on demand webcast.
In this episode Paul Asadoorian, John Strand and Gabriel Gumbs talk about how Active Directory is setup, why it's innately insecure, and why this is a major security problem for organizations today. Gabriel also explains how you can demonstrate the scope of your organization's AD problems, and how STEALTHbits can show you the things you won't see just by looking at Active Directory, like toxic condition, effective access, and direct access.
Click here to learn more about our Active Directory Auditing and Reporting solution.
In this episode Paul Asadoorian and Gabriel Gumbs talk about how STEALTHbits helps organizations locate sensitive data, tell them who has access to that data, the activity surrounding that data, and control access to that data. Our products have been helping IT professional better define their security strategy around their data starting with sensitive data discovery, since most companies are uncertain of exactly where all their sensitive data resides.
Click here to learn more about our Sensitive Data Discovery Solution.
In this episode Paul asks Jonathan a few information security questions at InfoSec World like whether or not compliance hinders or enhances security, what are some of the common denominators among companies that have suffered breaches, and how organizations can make sure security is a consideration when implementing a new IT project, Hint: they should include the security team in the conversation.
Paul Asadoorian does Hacker Movie trivia with Jonathan Sander. See if you can guess these hacker movies before Jonathan. Sadly, Jonathan only gets 1 out of 5 during that round, but he redeems himself in the 5 true/false questions about the 1995 film The Hackers.
Industry veteran Doug White will show us how file systems are analyzed. Doug's been performing file system analysis for a long time, back when they used rudimentary tools like anvils. We will continue the tools discussion with Jonathan Sander from STEALTHbits, who will talk about how you can automate all those boring file system analysis tasks, and use your anvil for more productive things, like making swords.
Click here to register for this on-demand webinar.