BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

September, 2010

Configuration Compliance and Regulatory Reporting

Posted September 9, 2010    Brad Hibbert

In recent years there have been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity and availability of information stored in their systems and provided through external parties. After reading various whitepapers, websites and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST,…

Tags:
, , , , , , , , , , , ,
adobe

Adobe CoolType (SING) Font Buffer Overflow

Disclosed September 8, 2010    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:

Video: eEye’s Support of Government Standards

Posted September 7, 2010    Marc Maiffret

For many years now, eEye has had a strong partnership with the government to help both educate and support important security standards that help to create a common language and framework for security technologies to inter-operate. We have led the way with supporting many government security standards and frameworks within our products and typically well…

Tags:
, , , ,

DLL Hijacking Assessment & Mitigation

Posted September 3, 2010    Marc Maiffret

There has been a lot of discussion lately about the older, but newly rediscovered, DLL Hijacking vulnerability. If you are not already familiar with this vulnerability, it allows for system compromise across an unknown number of applications. Specifically, the vulnerability takes advantage of the process of how Microsoft Windows applications load DLL (Dynamic-Link Library) files,…

Tags:

The Retina Protection Agent

Posted September 2, 2010    Morey Haber

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus…

Tags:
, , , , , , , , , ,