BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
webinar_ondemand

On Demand Webinar – Why You Still Suck at Patching

Posted March 27, 2015    Lindsay Marsh

On Demand Webinar: Dave Shackleford recounts some of his personal experiences in patch management failure, and breaks down the most critical issues holding many teams back from patching more effectively.

Categories:
Vulnerability Management
Tags:
,
dave-shackleford-headshot

Why You Still Suck at Patching…and How to Turn Your Life Around

Posted March 25, 2015    Dave Shackleford

Live webinar | March 26, 2015 | 10am PT/1pm ET | Dave Shackleford, SANS Instructor | Why You Still Suck at Patching…and How to Turn Your Life Around

Categories:
Vulnerability Management
Tags:
, ,
infographic

Privilege Gone Wild 2: Over 25% of Organizations Have No Privileged Access Controls

Posted March 24, 2015    Scott Lang

BeyondTrust recently conducted a survey, with over 700 respondents, to explore how organizations view the risk of misuse from privileged account misuse, as well as trends in addressing and mitigating those risks.

Categories:
Privileged Account Management
Tags:
,
webinar_ondemand

On Demand Webinar – A Security Expert’s Guide: The Windows Events You Should be Tracking and Why

Posted March 23, 2015    Lindsay Marsh

On-Demand Webinar – Windows Security Expert and MCSE, Russell Smith, discusses the Windows Events you should be tracking right now and why. He will also show you how to set up Event Log subscriptions so you have better monitoring across your Windows environments.

Categories:
Privileged Account Management
Tags:
, ,
databreach

5 Best Practices Healthcare Organizations can do to Help Mitigate Risks

Posted March 20, 2015    Lindsay Marsh

Healthcare data breaches are becoming far too common and the data extracted is more harmful to the public than credit card data. As a healthcare organization, reducing security breaches should be a top agenda item.

Categories:
Privileged Account Management
Tags:
, , , ,
jeremymkowitz

On Demand Webinar: Group Policy Backup and Restore

Posted March 19, 2015    Lindsay Marsh

Join Group Policy MVP, Jeremy Moskowitz of GPanswers.com, and learn several ways to backup your GPOs, and ensure that when disasters occur (and they always do) that you’re prepared and ready to act. This is a webinar you don’t want to miss!

Categories:
Network Security
Tags:
,
premera-breach

Premera Breach – What Happened and Was it Related to the Anthem Breach?

Posted March 18, 2015    BeyondTrust Research Team

Premera Blue Cross, a major health care services provider, recently disclosed information regarding a data breach that could impact 11 million of its customers. According to Premera’s cyberattack website created to disseminate information about the breach, hackers gained access to their systems and may have accessed customer information including names, addresses, email addresses, telephone numbers,…

Categories:
Security Research, Vulnerability Management
Tags:
,
Enterprise Password Management

On-Demand Webinar: The Dark and Bright Side of Enterprise Password Management

Posted March 12, 2015    BeyondTrust Software

New webinar featuring Security Expert MVP, Paula Januszkiewicz in a discussion on Enterprise Password Management.

Categories:
Network Security, Privileged Account Management
Tags:
, , ,
patch-tuesday

March 2015 Patch Tuesday

Posted March 10, 2015    BeyondTrust Research Team

Microsoft patched 44 CVEs across 14 bulletins this month, with vulnerabilities in Internet Explorer and Adobe Font Driver necessitating the bulk of those fixes. With so many bulletins, it was only natural that a wide variety of security flaws were found:  remote code execution, elevation of privilege, denial of service, information disclosure, cross-site scripting, spoofing and security feature bypass were all present and accounted…

Categories:
General, Network Security, Vulnerability Management
Tags:
, ,
{c4eae211-3ca2-4f8e-b2b9-6df0e970aab1}_g.markhardy

The “insider” threat. Is it real, or is it being blown out of proportion?

Posted March 4, 2015    G. Mark Hardy

A lot depends on whether or not you’ve been compromised. And therein lies the problem. Cyber threats are often ignored until they cause some damage, at which point management looks for people to blame and gives all kinds of attention to fixing the problem – until the next crisis in accounting or warehousing or staffing comes along.

Categories:
Privileged Account Management
Tags:
, , ,