Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for June, 2011


Sensitive Data Security – Our Pledge to Your Customers

In the wake of the recent attack on the Sony PlayStation Network and the resulting massive data breach, consumers are more than a little concerned about the security of the sensitive information that they provide companies. For the most part, many of them know very little about the online security measures in place at companies with whom they do business. And until recently, they probably didn’t care.

Post by Peter McCalister June 20, 2011

Macs Need Least Privilege Too

Turns out that Macs aren’t as virus and hacker proof as originally perceived. Just check out a recent posting on to read all the details. In this blog post it appears that a new malware threat is appearing when users perform Google searches. I’ve actually seen this malware pop up on a Mac recently,…

Post by Peter McCalister June 17, 2011

Cloud Vendors Need Least Privilege For Better Security

If you want to use the cloud and need to do it in a secure and compliant way you’re going to need to think about who’s responsible for what. As numerous studies and articles have highlighted, most cloud vendors today don’t provide a platform that’s fully up to enterprise security standards.

Post by Peter McCalister June 16, 2011
psst wanna buy-resized-600.gif

Pssst – Hey Buddy, Wanna Buy Some Data?

The economy of cyber crime is all too real – and too enticing. No longer sequestered to dark alleys and seedy bars, data thieves have almost unlimited options to market their ill-gotten wares to potential buyers. What this means to employers and organizations: The temptation to access and ‘appropriate’ sensitive data may be too great for some to resist.

Post by Peter McCalister June 15, 2011

What Do You Think About eEye’s Zero-Day Tracker?

What Do You Think About eEye’s Zero-Day Tracker (

Post by The eEye Research Team June 15, 2011

Microsoft Patch Tuesday – June 2011

Another even month, another huge security bulletin release by Microsoft. Those who took my advice and convinced their bosses to let them take vacation this month avoided 16 security bulletins – hopefully your co-workers will have them fully tested and deployed before you return. For those of us not sitting on a beach somewhere, there…

Post by Chris Silva June 14, 2011

The University of Winchester Selects PowerBroker Desktops

The University of Winchester is an educational institution in the United Kingdom with a strong heritage and innovatice teaching model. Their 5,900+ students enjoy educational challenges in 17 different departments at the hands of over 650 staff members.

Post by Peter McCalister June 14, 2011

Unified Vulnerability Management for Financial Organizations

If you are in the financial sector, how are you protecting your financial systems from tampering? If you are the CEO or CFO you must ensure that you financial reports are accurate, delivered in a timely fashion, and do not contain any information that was tampered with. This requires securing critical information technology systems that…

Post by Morey Haber June 14, 2011
eye in the sky_smaller-resized-600.jpg

Monitoring the Highly Privileged User

Today there are more insider data breaches than ever before. Verizon reports that in 2010, 48 percent of all breaches were attributed to users who abused their network privileges to maliciously access and distribute sensitive corporate information. Even minor policy violations, whether deliberate or inadvertent, the study finds, correlate directly with more serious abuse. At…

Post by Peter McCalister June 13, 2011

McAfee Vulnerability Manager Utilizes Least Privilege

We recently announced the integration of our PowerBroker Server with McAfee’s Vulnerability Manager to help smooth compliance processes. The integration will give our customer’s the ability to better manage user access and privileges, while simultaneously expanding the coverage of security scans for a more complete, accurate view of IT security and compliance across physical, virtual…

Post by Peter McCalister June 10, 2011