5 Data Privacy Best Practices
With the enactment of the California Consumer Privacy Act (CCPA) and the ever-evolving COVID-19 pandemic, Data Privacy has been at the forefront in 2020 and will remain an important challenge that...
View ArticleBest Practices – Setting up StealthAUDIT SQL Server Database
If you decided to implement StealthAUDIT to meet your data access governance and security needs, then you made the right decision. StealthAUDIT core requires a SQL Server database to store the...
View ArticleData Privacy Trends to Watch Out For in 2021
Data privacy has become the expectation for every consumer across the globe, becoming more than a set of rules and regulations driven by compliance standards, but rather one of the primary pillars...
View ArticleGlobal Compliance Demands: The Singaporean Personal Data Protection Act...
The push for data privacy regulation has exploded in recent years, with the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) taking center stage. Gartner...
View ArticleIntroducing the Data Privacy Engine
Today, we are introducing a new method to tackle Data Subject Access Requests (DSARs) that will enable our customers to obtain results in seconds. Available as an add-on to complement StealthAUDIT,...
View ArticlePROTIP – Fulfill a DSAR with StealthAUDIT 11.0
A Data Subject Access Request (DSAR), a common term amongst data privacy regulations, is an individual’s right to request information on personally identifiable information (PII) an organization has...
View ArticleActive Directory Permissions – Hiding in the Shadows
Understanding the Risk of Active Directory Permissions and Shadow Access I recently covered the topic of Active Directory permissions by giving an overview on how to apply them and view what already...
View ArticleScanning for Sensitive Data in Azure Storage (Blobs) with Stealthbits AnyData
The Importance of Cloud Storage – From SMBs to the Enterprise With the release of Version 11.0, StealthAUDIT’s Sensitive Data Discovery tools now include our AnyData connector, which allows users to...
View Article3 Strategies to Ensure Readiness for DSARs
A data subject access request (DSAR) is a common requirement in privacy regulations today. It grants individuals the right to request all the personally identifiable information (PII) an organization...
View ArticlePROTIP – How to Purge Data in StealthAUDIT
If you have been using StealthAUDIT for your data access governance (DAG) and compliance needs, then you have likely come across situations where you would like to purge data pertaining to a specific...
View Article