BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

May, 2010

My iPad 3G Issues

Posted May 24, 2010    Morey Haber

I am one of the few hundred thousand people that pre-ordered an iPad several weeks before its release. I pre-ordered the unit with 3G service and it arrived on the last day of April. Before it arrived, Apple had been shipping me all of the accessories that I pre-ordered. Thank goodness the iPad 3G is…

Tags:
, ,

Vulnerability Assessment for Network Devices – Now More Than Ever!

Posted May 19, 2010    Morey Haber

Here is a startling statistic and article written by Dark Reading: More Than One-Third Of Network Devices Show Vulnerabilities when vulnerability data was compiled from 235 different enterprises during vulnerability assessment scans in 2009. Think about this for a minute. One third of their devices had potential security vulnerabilities that could comprise their networks and…

Tags:
,

Restoring Old Systems and Building New Ones

Posted May 17, 2010    Morey Haber

This weekend I needed to perform a system restore on my son’s notebook. He actually has two systems, one for school (kept pristine) and one that he surfs the web with looking for game mods, cheat codes, etc. The latter is an older Pentium M tablet that acts as a good netbook. If something happens…

Tips for ID’ing Your Phone and Laptop

Posted May 14, 2010    Morey Haber

I personally think I have set a new record for going through three Blackberry phones in one week. I had my old phone (which was continuously having runtime errors) for over a year. I received a new unit and after two days it broke (don’t ask) and required a third replacement unit. Like any programmable…

Microsoft Patch Tuesday – May 2010

Posted May 11, 2010    Chris Silva

Well, as mentioned on Thursday, it was a relatively small Patch Tuesday from Microsoft. Here are our recommendations for the two security updates. You can find our full write-up in newsletter format here. MS10-030 – Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (978542) Administrators are urged to roll out this…

Microsoft Patch Tuesday Advanced Notification – May 2010

Posted May 6, 2010    Chris Silva

It’s that time again, and Microsoft has just released their advanced notification for next week’s Patch Tuesday. Luckily for those still recovering from the April Patch Tuesday, this month should be a bit easier. Microsoft has announced it will be releasing two patches. They have been classified as: * Critical (2 Patches) All currently supported…

Keeping Your Flat File Databases Secure

Posted May 6, 2010    Morey Haber

Let’s move on to something less controversial (complete with new editor). Just a few weeks ago Dark Reading featured an interesting article highlighting the risks and sensitivity of data in flat file database formats. A lot of focus has been placed on database scanning, however users tend to ignore flat file databases used for applications…

Tags:

Penetration Tools (Updated)

Posted May 3, 2010    Morey Haber

The post I had here earlier was worded in a way that was misleading, and I want to rewrite it now so that I’m perfectly clear. Thousands of legitimate individuals and businesses (including eEye) perform penetration testing, which is useful, required by regulatory compliance, and a very important tool in the security industry. Referring to…