Quantcast
Channel: Stealthbits Technologies
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

5 Data Privacy Best Practices

With the enactment of the California Consumer Privacy Act (CCPA) and the ever-evolving COVID-19 pandemic, Data Privacy has been at the forefront in 2020 and will remain an important challenge that...

View Article


Image may be NSFW.
Clik here to view.

Best Practices – Setting up StealthAUDIT SQL Server Database

If you decided to implement StealthAUDIT to meet your data access governance and security needs, then you made the right decision.  StealthAUDIT core requires a SQL Server database to store the...

View Article

Data Privacy Trends to Watch Out For in 2021

Data privacy has become the expectation for every consumer across the globe, becoming more than a set of rules and regulations driven by compliance standards, but rather one of the primary pillars...

View Article

Global Compliance Demands: The Singaporean Personal Data Protection Act...

The push for data privacy regulation has exploded in recent years, with the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) taking center stage. Gartner...

View Article

Introducing the Data Privacy Engine

Today, we are introducing a new method to tackle Data Subject Access Requests (DSARs) that will enable our customers to obtain results in seconds. Available as an add-on to complement StealthAUDIT,...

View Article


Image may be NSFW.
Clik here to view.

PROTIP – Fulfill a DSAR with StealthAUDIT 11.0

A Data Subject Access Request (DSAR), a common term amongst data privacy regulations, is an individual’s right to request information on personally identifiable information (PII) an organization has...

View Article

Image may be NSFW.
Clik here to view.

Active Directory Permissions – Hiding in the Shadows

Understanding the Risk of Active Directory Permissions and Shadow Access I recently covered the topic of Active Directory permissions by giving an overview on how to apply them and view what already...

View Article

Image may be NSFW.
Clik here to view.

Scanning for Sensitive Data in Azure Storage (Blobs) with Stealthbits AnyData

The Importance of Cloud Storage – From SMBs to the Enterprise With the release of Version 11.0, StealthAUDIT’s Sensitive Data Discovery tools now include our AnyData connector, which allows users to...

View Article


3 Strategies to Ensure Readiness for DSARs

A data subject access request (DSAR) is a common requirement in privacy regulations today. It grants individuals the right to request all the personally identifiable information (PII) an organization...

View Article


Image may be NSFW.
Clik here to view.

PROTIP – How to Purge Data in StealthAUDIT

If you have been using StealthAUDIT for your data access governance (DAG) and compliance needs, then you have likely come across situations where you would like to purge data pertaining to a specific...

View Article
Browsing latest articles
Browse All 10 View Live