BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for November, 2011

least privilege architecture

Least Privilege Windows Architecturally Speaking

We’ve talked about least privilege throughout thisblog over the past two years at length, but why should a desktop user care? Ultimately, a user needs admin rights on the desktop to

Post by Peter McCalister November 30, 2011
BeyondTrust is the expert source of VMware Security LEARN MORE
mandm-1

M&M Security Bound To Be Eaten Without Least Privilege

No, I’m not talking about the Mars candy, funny characters pervasive on your TV, or even the legendary brown ones from a Van Halen concert rider.

Post by Peter McCalister November 28, 2011

Windows Server 2008 R2 Recycle Bin

Microsoft has included recovery capabilities with every release Active Directory (AD) from Windows Server 2000 on. There is a saying that has been around in IT for a long time, “An administrator is only as good as their last backup”. This is because accidental deletions of a single user object to the removal of hundreds…

Post by Morgan Holm November 26, 2011
Tags:
, , , , , , ,
thxgiving

Don’t Be The IAM Turkey This Thanksgiving

Most of the United States and Canada are preparing for the anual food fest known as Thanksgiving tomorrow to celebrate the bountiful harvest season. Or is it just an excuse for a work holiday in November? Either way, you can be sure that the potential for IT security breaches increase as vigilance wains for the holiday season.

Post by Peter McCalister November 23, 2011
villain trio

The Insider Threat Epidemic

Insider threats, particularly unauthorized access by current and former employees, are still a growing concern for IT managers and network administrators, according to InformationWeek’s Insider Threat Reality Report. In the report, several internal issues were cited for network intrusions, including: lack of adequate security policies (17 percent); employee negligence (12 percent); unauthorized access by current…

Post by Peter McCalister November 22, 2011
img

Big Data? Is There Any Bigger Data Than Your Security Data?

The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc. For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat and risk intelligence (assessments, compliance reports, attack…

Post by Morey Haber November 22, 2011
Tags:
no excuses

You Will Know It When You See It

One of most talked about topics at the just completed Gartner Identity and Access Management Summit in San Diego was advanced persistent threats. While it may be hard to define, and I will leave that to the experts at Gartner, based on the level of discussion at the event and all the available data this is a topic you will get to know in the near future.

Post by Peter McCalister November 21, 2011
austinlogo[1]

Austin Powder uses PowerBroker to Implement Least Privilege

Austin Powder, a manufacturing firm based in Ohio, faced an interesting challenge of taking their company to a least privilege model. They also needed to reduce malware threats within the organization. At the start of the project, the company knew little about the least privilege model. They began to develop an in-house solution, a wrapped…

Post by Peter McCalister November 18, 2011
cloudlock-1

In The Cloud You Don’t Want To Be Sudo Wrestling!

In a recent discussion with several customers we asked a questions, “How many of you are deploying clouds?”, everyone raised their hand. Then we asked similar questions about public and private clouds. Everyone still raised their hand. Many companies are implementing new infrastructure that includes both private and public cloud. This is often referred to…

Post by Peter McCalister November 17, 2011
BTR cvr

Born To Run…and Can Your Cloud Escape Injury?

There’s a lot of hype in the running community over the 2009 book by Christopher McDougal, “Born To Run.” It has inspired a host of people–experienced runners and average Joes–to switch to barefoot running, where people where either nothing on their feet at all or some sort of minimalist shoe. The most headturning of these minimalist shoes have to be the Vibram Five Fingers shoes. You’ve seen them–they look like gloves for feet.

Post by Peter McCalister November 16, 2011