BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for January, 2012

img

Post-Password Predictions And What They Mean For You

The list of problems with passwords has been documented over and over again: Users keeping spreadsheets of their personal passwords, using ordinary everyday words, keeping their passwords on sticky notes, or constantly harassing the IT department for help with forgotten passwords–the list goes on and on. Even clever password creation and rating sites have been…

Post by Peter McCalister January 18, 2012
president

Follow The Leader? Or Face Insider Threats…

It has been nearly six years since the inception of WikiLeaks, yet the U.S. government has just begun to identify methods to combat insider threats within the military. In October, President Obama established an “Insider Threat Task Force” to help prevent potentially damaging and embarrassing exposure of government secrets. He also unveiled new computer security…

Post by Peter McCalister January 17, 2012
cloudlock-1

Trust Alone Is Not Enough According To Survey

A recent survey done by a BeyondTrust swat team passing out surveys received over 111 responses all to find out if people trust their cloud vendors with their data. If you haven’t read it, we also participated in a great TechDebate with NetworkWorld that put the issue of cloud security to the test. We went…

Post by Peter McCalister January 16, 2012
gangs as inside threat

Gangs Infiltrating Companies As Insiders To Steal Idenities

It was only a matter of time before organized gangs would discover how easy it is for an insider to gain access to sensitive data and realize that if you can’t beat them, join them. A recent blog titled “NY ID Theft Ring Used Insiders, Gang Members” published by Brian Krebs highlights that “Authorities in…

Post by Peter McCalister January 13, 2012
bridge-france-resized-600.jpg

Active Directory Bridge – A Path To PCI Compliance

What is an Active Directory Bridge and how does it help me with PCI compliance? What is an Active Directory Bridge? First, as Gartner discussed at the Gartner Identity and Access Management Summit, Active Directory doesn’t do everything. It is not optimized for UNIX, Linux or Mac OS X and it’s difficult to leverage the…

Post by Peter McCalister January 12, 2012
monster under bed

If I Duck My Head Under This Blankie, The Monsters Can’t Get Me

Remember when we were kids and we’d hear a strange noise from the other room, or the closet. Maybe it was after your parents finally let you watch that movie you promised wouldn’t give you nightmares. Back then nothing could get us, so long as we hid under out blankets. But we had to do…

Post by Peter McCalister January 11, 2012
patch-tuesday

Microsoft Patch Tuesday – January 2012

Before we get started on this month’s releases, just a quick reminder that Microsoft released an out-of-band (OOB) security bulletin (MS11-100) late last month. That brought their 2011 total to 100 bulletins – so much for keeping it in double digits. To start off the new year, today Microsoft released seven bulletins. Microsoft finally tamed…

Post by Chris Silva January 10, 2012
villain trio

Healthcare Data Breaches Thanks To Insiders

A Ponemon Institute report published this month found that healthcare data breaches have risen 32 percent since 2010. Ninety-six percent of all healthcare providers say they have had at least one data breach in the last two years and that most of these were due to employee mistakes and sloppiness, while 46 percent of respondents…

Post by Peter McCalister January 10, 2012
lucy2

Top 5 Data Breach Excuses Of 2011 (And What They Really Mean): Part 5

DON’T COMMENT AT ALL – EVEN WHEN A GOVERNMENT WATCHDOG OUTS YOUR POOR PRACTICE MUCH LATER – Numerous UK Local Authorities up to Nov 2011 This strategy is used by organisations who know that trying to make an excuse for such widespread poor practice is like pouring petrol on a fire. Best to keep quiet…

Post by Peter McCalister January 9, 2012
sam2

Top 5 Data Breach Excuses Of 2011 (And What They Really Mean): Part 4

WE’RE STILL INVESTIGATING HOW IT HAPPENED, IT’S TOO CONFIDENTIAL TO SAY MORE, BUT REST ASSURED EVERYTHING IS OK NOW. – The IMF, June 2011 This excuse is often used by organisations that decide to mop up media interest with an early announcement confirming investigations are underway (we’re taking this seriously) while reassuring people everything is…

Post by Peter McCalister January 6, 2012