BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

March, 2012

dell

Quest InTrust ActiveX Multiple Vulnerabilites

Disclosed March 30, 2012    Workaround Available
Vendors: Quest Software (Dell)
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
retina-insight1-680x316

Exploitability in Context

Posted March 28, 2012    Alejandro DaCosta

Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for…

Tags:
, , , , , , ,
Lockdown

Nefarious and Angry Employees Still a Primary Threat to Organizations

Posted March 26, 2012    Peter McCalister

A new Ponemon study reports that the number of data breaches caused by malicious attacksincreased from 31 percent in 2010 to 37 percent in 2011, with malicious insiders being responsible for 33 percent of attacks. In the report Ponemon states, “We think about the evil hacker, which is pretty serious stuff, but in our study,…

cloudlock1

Least Privilege Can Reduce Malware

Posted March 23, 2012    Peter McCalister

If you’re like most companies, you’ve invested heavily in antivirus software. But are you still having to deal with the latest viruses, trojans, and ransomware? Are you having to wait until your AV provider can fix the latest bugs and get you the cure, while your network is left open and unprotected? Instead of asking…

perimeter within

Security from Data Breaches Start from Within

Posted March 22, 2012    Peter McCalister

Keeping the bad guys out is what comes to mind for a lot of us when we think of securing our companies’ IT environment. And to be honest, this mindsit might very well be the reason we hear about so many data breaches. Companies are getting hit with breach and breach of sensitive information despite…

wokka-wokka-98x98

In Configuration We [Still] Trust

Posted March 22, 2012    Marc Maiffret

It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These…

Tags:
, ,

PowerBroker Recovery for Active Directory Takes the Pain and Uncertainty out of AD Recovery

Posted March 19, 2012    Morgan Holm

I remember back in school working on an essay for days, saving it to my local 5 ¼ inch floppy just to find a disk error when trying to print it the day before it was due. Remembering all that I wrote, and then actually doing the work, gave me an unsettling feeling in my…

Tags:
, , ,
lock

Least Privilege Can Help Solve IT Negligence

Posted March 19, 2012    Peter McCalister

The Ponemon Institute along with Trend Micro recently surveyed more than 700 ITprofessionals on the subject of the human factor in data breaches. According to the survey, 78 percent of respondents have experienced a data breach as a result of negligent or malicious employees or other insiders. This doesn’t surprise us here at BeyondTrust. We…

Picture-5

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Posted March 15, 2012    Sarah Lieber

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Tags:
, , , , ,
Good-better-best

Identity Management is Best in Enterprise Security

Posted March 14, 2012    Peter McCalister

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could…