BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Categories:
New Features, Privileged Account Management
Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Categories:
Privileged Account Management
Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Categories:
Privileged Account Management
Tags:
, ,
Patch Tuesday MS15-078

Microsoft Patches a Critical Vulnerability in Adobe Type Manager Font Driver

Posted July 20, 2015    BeyondTrust Research Team

Today, Microsoft released the MS15-078 bulletin containing a patch for yet another flaw in the Adobe Type Manager Font Driver (atmfd.dll). This patch, coming just shy of a week after Microsoft’s monthly Patch Tuesday event, fixes a kernel pool overflow vulnerability (CVE-2015-2426), which can allow remote code execution with full system rights. The vulnerability lies…

Categories:
Security Research, Vulnerability Management
Tags:
,
Palo Alto firewall events are automatically correlated to assets and normalized as Attack, Scanner (Vulnerability), and Malware threats

Threat analytics is more fun when you do it with friends

Posted July 20, 2015    Chris Burd

At BeyondTrust, we know our customers’ lives are a lot easier when their security products play nicely with one another. That’s why we think “outside the silo” when building our privileged account management and vulnerability management solutions – and it’s also why the majority of our solutions operate under the BeyondInsight risk management platform. Think…

Categories:
New Features, Privileged Account Management
Tags:
, , , , ,
powerbrokerforwindows6.8

PowerBroker for Windows v6.8: New Enhancements to Simplify Deployments and Management

Posted July 17, 2015    Scott Lang

We’re pleased to announce the availability of PowerBroker for Windows version 6.8, released today and building on patented least privilege management capabilities. This release is packed with enhancements meant to further simplify least privilege management and deployments. Read on to learn what’s new.

Categories:
New Features, Privileged Account Management
Tags:
,
BlackHatLogo

Black Hat Survey: Gap Between Security Concerns and Resources – a Maturity Problem

Posted July 16, 2015    Scott Lang

In advance of the upcoming Black Hat conference, the organization released a first-ever research report based on results of a survey to prior conference attendees. The report, titled, “2015: Time to Rethink Enterprise IT Security”, “reveals a significant gap between the priorities and concerns as well as the actual expenditure of security resources in the average enterprise.”

Categories:
Privileged Account Management, Vulnerability Management
Tags:
, , ,
expert-russellsmith

An Expert’s Guide: Secure Windows Server PowerShell Remoting

Posted July 15, 2015    Russell Smith

Learn how PowerShell Remoting can be configured to provide a secure means of remote administration, how to control which users can access PowerShell remote endpoints, and additionally how to secure PowerShell Remoting outside of an Active Directory environment using SSL.

Categories:
Privileged Account Management
Tags:
,
patch-tuesday

July 2015 Patch Tuesday

Posted July 14, 2015    BeyondTrust Research Team

July’s Patch Tuesday is a hefty one, clocking in with 14 bulletins, including the typical misfits – Internet Explorer and Office. Last month’s missing bulletin (MS15-058) is now included, patching important-rated vulnerabilities within SQL Server.

Categories:
Security Research
Tags:
,
tracie_grella_aig

The Current State of the Cyber Insurance Market and its Role in Managing Cyber Risk

Posted July 14, 2015    Tracie Grella

Cyber insurance is the fastest growing insurance product today, it’s development spurred on by several large data breaches covered in the news the past year and a half. As with any new product/service, there is a lot of variation and evolution in the coverage; here is what you need to know.

Categories:
Privileged Account Management, Vulnerability Management
Tags:
, , ,