BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for March, 2011

shoe

The Cobbler’s Son Has No Shoes

What happens when a top security company fails to implement a least privilege solution? Just look at what was reported about RSA to see what awaits you if you fail to implement a least privilege solution and someone hijacks credentials to steal information via Advanced Persistent Threat. Yep, the cobbler’s son does have NO SHOES.

Post by Peter McCalister March 31, 2011
BeyondTrust is the expert source of VMware Security LEARN MORE
eye in the sky_smaller-resized-600.jpg

Vulnerability Scanning From a Virtual Machine

Virtualization offers a wide array of benefits from power and environmental constraints to physical space limitations and disaster recovery efforts.  As leaders  for Unified Vulnerability Management, we realize these benefits offer a significant value  to our install base and we are in full support of virtualization for our solutions. Although virtualization is in many ways…

Post by Morey Haber March 30, 2011
smartphone4-resized-600.jpg

BlackBerry Vulnerability – Where’s the Admin Privileges?

If you haven’t read by now, at this year’s Pwn2Own hacker challenge that took place at CanSecWest in Vancouver last week, the iPhone and Blackberry were both hacked. Teams also demonstrated several vulnerabilities in browsers, macbooks and more.

Post by Peter McCalister March 30, 2011
Team

3 Things Local Admins Can Do That They Shouldn’t

Eliminating local admin rights from Microsoft Windows users is not just a nice thing you should do, but in fact a mandatory best practice for all of today’s enterprises wishing to stay secure and compliant.

Post by Peter McCalister March 29, 2011
Accidental Harm

Misuse Privilege and GO TO JAIL

You may have thought that misuse of privilege is a victim less crime and no one will care. Just ask former Goldman Sachs programmer, Sergey Aleynikov what he is doing for the next 8 years and then decide for yourself.

Post by Peter McCalister March 28, 2011
Lockdown

How Sensitive Could Data Be?

Here at BeyondTrust, we work with some of the most sensitive information in the world. The kind of stuff that makes or breaks businesses, collapses empires, or creates headlines. Ok – we’re being melodramatic, and we also deal with things as simple as system configuration settings that hike up help desk costs.

Post by Peter McCalister March 25, 2011
img-mobile

A Basic Guide to SCAP

The Security Content Automation Protocol (SCAP, pronounced S-cap) is a suite of open standards that when referenced together, deliver an automated vulnerability management, measurement, and policy compliance evaluation for network assets. The first version of the suite specification focused on standardizing communication of endpoint related data and to provide a standardized approach to maintaining the…

Post by Morey Haber March 24, 2011
Tags:
, ,
logo_cetrel

CETREL S.A. Replaces SUDO with PowerBroker for Servers

<![CDATA[ CETREL S.A., an advanced electronic payment company, is headquartered in Masbach, Luxemberg. It’s active in three lines of business: business process outsourcer for cards, acquirer for multi-domestic and international merchants, and provider of share service center solutions for the financial industry. The company is also a member of the SIX group, and is working…

Post by Peter McCalister March 24, 2011
hands

Top 10 Reasons Good People Do Bad Things Without Least Privilege

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons Good People Do Bad Things Without Least Privilege are:

Post by Peter McCalister March 23, 2011
mdalogo-250

MD Anderson Selects PowerBroker for Servers

The University of Texas M.D. Anderson Cancer Center is a world-leading intitution for cancer treatment. In 2008 alone, the facility cared for nearly one million people, and it supports a faculty and staff of both MDs and PhDs numbering over 20,000. Their IT network is based on a powerful and secure Unix infrastructure, and includes over 500 servers that house confidential patient and financial information.

Post by Peter McCalister March 22, 2011