Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


November, 2010

Microsoft Patch Tuesday – November 2010

Posted November 10, 2010    Chris Silva

Finally a reprieve from the barrage of Microsoft Patches. This month, Microsoft only released 3 security bulletins, patching a total of 11 vulnerabilities. Good news for IT server admins, as the patches only affected Microsoft Office and Microsoft Forefront Unified Access Gateway. This means that most of you won’t need to reboot your servers this…

Top 10 Reasons To Implement Least Privilege on Windows Desktops

Posted November 9, 2010    Peter McCalister

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format.

The 6 Things You Should Know Before Migrating to Windows 7

Posted November 8, 2010    Peter McCalister

Microsoft has done a great deal of exceptional work in improving Windows 7 from its predecessor, Windows Vista.

5 Things You Should Know About Microsoft AppLocker

Posted November 5, 2010    Peter McCalister

Microsoft AppLocker has also been touted as the next best thing in desktop security (in addition to UAC) but does it really satisfy all you need in order to ensure security, compliance and productivity?

Simplified Vulnerability Management – Mission Statement

Posted November 5, 2010    Morey Haber

Almost every company has a mission statement. Some companies make them public and a part of their marketing campaigns, tag lines, and actual products. Others keep their mission statements internal, almost like a prized position, and keep them for only training and hallway posters. One thing I have learned at eEye as the Product Manager,…

Health Care Data Requires Sensitive User Access Control

Posted November 4, 2010    Peter McCalister

Of the many recently reported data breaches from hospitals and health care organizations


Adobe Reader printSeps() Heap Corruption

Disclosed November 4, 2010    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:

Control Virtual Sprawl With Privilege Identity Management

Posted November 3, 2010    Peter McCalister

Virtual sprawl is the new plague of IT.

Benchmarks as a Point of Reference

Posted November 3, 2010    Morey Haber

I have been reading Stephen Hawking’s new book, “The Grand Design” and am completely stunned by the analogies he uses to simplify perception, measurements, and even quantum physics. This book is not light reading and has had me looking up terms using old college textbooks and Google multiple times. The one thing that fascinates me…

, , , , , , , ,

Microsoft Internet Explorer CSS Clip Attribute Memory Corruption

Disclosed November 3, 2010    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: