BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for November, 2010

hands

Top 10 Reasons To Use Licensed Software Vs Freeware

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons To Use Licensed Software Vs Freeware are:

Post by Peter McCalister November 30, 2010
BeyondTrust is the expert source of VMware Security LEARN MORE
Guy PC

More Collaboration Needed For IT Governance and Compliance

In a new survey conducted by Unisphere Research, results showed that even as many Database Administrators (DBAs) are willing to assume much needed security practices in their daily duties, there is an overwhelming communication disconnect between these data managers and the security and executive leadership responsible for the data security at the end of the day.

Post by Peter McCalister November 29, 2010
ipad pic

Mobile Workers Require Setting Boundaries vs Building Walls

Although corporate networks today are increasingly open to subcontractors, partners or affiliates, or simply a workforce on the move, the tendency is still to think of security in the same way castles were defended in the middle ages, by building bigger walls – higher, wider and with more built in obstacles.

Post by Peter McCalister November 24, 2010
pillars

RIP Section 179 Benefits on December 31, 2010

The Economic Stimulus Act of 2008, which was extended to 2009 and 2010, is now coming to an end this year and the associated benefits with Section 179 will also be lost to businesses. Section 179 of the IRS tax code encourages businesses to buy equipment/software and invest in themselves to help spur our economy.

Post by Peter McCalister November 23, 2010
sweep-under-rug

Can Eliminating Admin Rights Reduce My Virus Protection Problems?

So you’ve invested heavily in antivirus software but still seem to have to deal with the latest viruses, trojans, ransomware until your AV provider can can formulate and download the cure. The question that should be top of mind is whether or not there is a way to prevent or at least limit malware from ever even entering your IT environment?

Post by Peter McCalister November 22, 2010
Potect With Confidence

Top 10 Reasons To Implement Least Privilege for Linux Servers

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons to Implement Least Privilege on Linux Servers are:

Post by Peter McCalister November 19, 2010
DOI Finds fault

Have the Feds Stumbled Upon a Global Cybersecurity Predicament?

The Department of the Interior Inspector General has issued a report that is critical of the agency’scybersecurity performance, summarizing that its efforts fall short of the federal government requirements. For example, the security levels of certain types of IT systems were not categorized correctly.

Post by Peter McCalister November 18, 2010
shoe

The Reality of “The Dirty Dozen” and why I love Google Chrome

If you have been following your security news the last couple of days you will have seen that there have been a handful of headlines about the “Dirty Dozen” most vulnerable applications with Google Chrome coming in at number one. Just from that fact alone I became quickly suspicious on the science behind the calculations…

Post by Marc Maiffret November 17, 2010
Tags:
, , , ,
cloudlock1

Computerworld’s Advice Still Relies Too Much on Trust

In a Computerworld article, last week, exploring the ‘scary side of virtualization’, the reporter, took some time out in a sidebar, to offer some sage staffing advice.

Post by Peter McCalister November 17, 2010
Team

Vulnerability Management in a Data Warehouse

Have you ever been asked, “How long has that vulnerability been in our systems?” Have you ever wondered if your patch management process is keeping up with the number of new vulnerabilities being identified? Keep reading…

Post by Morey Haber November 16, 2010
Tags:
, , , , , , ,