BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for July, 2011

cloudlock1

Security Is Not One-Size-Fits-All

When it comes to security, specifically when it comes to vulnerability management, one size doesn’t fit all. Organizations need to customize their tools based on a wide variety of business requirements. These include everything from scan windows, frequently changing credentials, report distribution and most importantly the architecture and volume of data that needs to be…

Post by Morey Haber July 19, 2011
MR

Predicting Insider Threats

In the movie Minority Report, police have created a system which predicts crime before it happens in a nightmarish Orwellian scenario. But what if companies could predict who would attack their most valuable assets? What kinds of ethical considerations would arise? While insider threats are less in number, when they do happen the damage is…

Post by Peter McCalister July 19, 2011
Sam2

Insider Hero Introduced: Secure Sam

In order to put a face on the depth and breadth of potential insiders that can be found throughout your enterprise, I will introduce you to three insider villains and three insider heroes. Each villain will represent one of the key misuse of privileges and each hero will represent key values delivered by least privilege. This fourth introduction will be of the most visible hero.

Post by Peter McCalister July 18, 2011

Data Governance

Hi my name is Morgan Holm and I am the director of product management. For my first blog post I will focus on a hot button topic for many of our customers and prospects, data governance. A significant portion of the data held by many organizations is in the form of unstructured data in files….

Post by Morgan Holm July 15, 2011
Tags:
, ,
annie

Insider Villain Introduced: Accident ProneAnnie

In order to put a face on the depth and breadth of potential insiders that can be found throughout your enterprise, I will introduce you to three insider villains and three insider heroes. Each villain will represent one of the key misuse of privileges and each hero will represent key values delivered by least privilege. This third introduction will be of the most unlikely villain.

Post by Peter McCalister July 15, 2011
perimeter within

Securing the Perimeter One Privileged User at a Time

You’ve heard it said before: “To some degree, you just have to trust your employees.” Ideally, yes. Trust between employee and employer is important, even necessary. But when this statement is made in the context of an employee’s access to a company’s most critical IT assets, the risk that accompanies it is simply too great…

Post by Peter McCalister July 14, 2011
lucy2

Insider Hero Introduced: Least Privilege Lucy

In order to put a face on the depth and breadth of potential insiders that can be found throughout your enterprise, I will introduce you to three insider villains and three insider heroes. Each villain will represent one of the key misuse of privileges and each hero will represent key values delivered by least privilege. This second introduction will be of the most impactful and prevalent hero.

Post by Peter McCalister July 13, 2011
patch-tuesday

Microsoft Patch Tuesday – July 2011

I’m really starting to enjoy the “odd” months, Microsoft kept to their pattern and released only four security bulletins today. A welcome reprieve from last month’s sixteen bulletins. The only “Critical” rated vulnerability released today affects the Windows Bluetooth 2.1 stack. This particular vulnerability is somewhat interesting due to the attack vector. As you know,…

Post by Chris Silva July 12, 2011
Lockdown

Corporate Security: The People’s Problem

Last week reports of a study done by the U.S. Department of Homeland Security were flying around the Internet, highlighting that if you simply drop a bunch of USB drives in your corporate parking lot, approximately 60 percent of your employees will pick up the drives, take them into the office and plug them into their computer. While the results of this study are being disputed, this tells us one thing definitively: employees are a huge security risk.

Post by Peter McCalister July 12, 2011
img-mobile

Right-click Metasploit Integration

At eEye we have been continuing an aggressive release schedule of major product updates that simplify your vulnerability management and compliance process. One of the ways that we continue to simplify vulnerability management is through new capabilities and reporting that allow for better prioritization of vulnerabilities from an overall risk management perspective. While other products…

Post by Marc Maiffret July 12, 2011