Archive for November, 2011
Customer conversations are the best part of my job. I really enjoy talking with users and buyers of security technology, especially in today’s hyperactive threat and attack climate. Most often these conversations are with customers proactively planning updates to their security strategy, or with prospects that have matured to a level where their tools need to be upgraded to enterprise solutions. However, there is small percentage of organizations we speak with who have come to eEye as a result of breach or a failed audit. One of *those* conversations was the impetus for this post.
Rogue employees can be found at Fortune 500 companies down to small businesses with less than ten employees. If there is one thing we know, insider threats don’t discriminate based on size. Many small businesses unfortunately suffer from the “it won’t happen to me” denial syndrome. Yet according to the Association of Certified Fraud Examiners Report to the Nation, the median loss suffered by organizations with fewer than 100 employees was $200,000.
Good people do bad things in the public as well as the private sector. It doesn’t matter the type or industry of an organization when sensitive information networks are breached.
As more and more of you drive to cloud-based applications and infrastructure because you are experiencing the pressures from management who seem to buy every single bit of hype generated by the press, it becomes clear where the biggest concerns arise. Namely security.
Group Policy provides powerful controls over desktop configuration, and it includes full delegation capabilities to allow network administrators to delegate Group Policy configuration tasks to others. Since Group Policy has so many powerful capabilities, it is critical to delegate certain tasks to other network administrators, without giving them Domain Admin rights or full edit rights over the entire Group Policy Object (GPO).
It seems that the tides have changed again with regard to Macs in the workplace, as covered by the Apple 2.0 blog on CNN Money. As noted in the post, “Hell freezes over: Forrester urges IT to support the Mac,” A new report from Forrester Research, Inc. urges IT departments to depart from their old…
This month Microsoft released four security bulletins, patching a total of four vulnerabilities. Included in this month’s bulletins is a particularly ugly vulnerability in tcpip.sys (MS11-083). This vulnerability involves sending a large amount of UDP packets to a closed port. While the amount of work to exploit seems great and Microsoft feels that exploitation will…
This week I had an interesting exchange with a full-time Linux administrator. What started out as a discussion about PowerBroker Servers Linux Edition, quickly became a heated debate about trust. After much back and forth, he said this: “At the end of the day, employers need to trust the employees. Relying on technological solutions to ‘keep honest people honest’ is putting the cart before the horse. If you can’t trust your employees, you shouldn’t have hired them.”
How many of you remember the Nicholas Cage character, Memphis Raines in the action movie Gone in 60 Seconds? If you do, bravo for being an action movie buff… for those of you not “in the know” he was a (fictional) car thief who had to steal 50 high end cars in just one night.
Recently we hosted a webinar with VMware, “Close Your Virtual App Security Gap”. If you haven’t had a chance to check out the materials from that webcast, you can find the slides here. It was a great session, where the eEye and VMware ThinApp product teams talked about virtual app security and how virtual apps can…