BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for March, 2012

retina-insight1-680x316

Exploitability in Context

Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for…

Post by Alejandro DaCosta March 28, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
Lockdown

Nefarious and Angry Employees Still a Primary Threat to Organizations

A new Ponemon study reports that the number of data breaches caused by malicious attacksincreased from 31 percent in 2010 to 37 percent in 2011, with malicious insiders being responsible for 33 percent of attacks. In the report Ponemon states, “We think about the evil hacker, which is pretty serious stuff, but in our study,…

Post by Peter McCalister March 26, 2012
cloudlock1

Least Privilege Can Reduce Malware

If you’re like most companies, you’ve invested heavily in antivirus software. But are you still having to deal with the latest viruses, trojans, and ransomware? Are you having to wait until your AV provider can fix the latest bugs and get you the cure, while your network is left open and unprotected? Instead of asking…

Post by Peter McCalister March 23, 2012
perimeter within

Security from Data Breaches Start from Within

Keeping the bad guys out is what comes to mind for a lot of us when we think of securing our companies’ IT environment. And to be honest, this mindsit might very well be the reason we hear about so many data breaches. Companies are getting hit with breach and breach of sensitive information despite…

Post by Peter McCalister March 22, 2012
wokka-wokka-98x98

In Configuration We [Still] Trust

It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These…

Post by Marc Maiffret March 22, 2012
Tags:
, ,

PowerBroker Recovery for Active Directory Takes the Pain and Uncertainty out of AD Recovery

I remember back in school working on an essay for days, saving it to my local 5 ¼ inch floppy just to find a disk error when trying to print it the day before it was due. Remembering all that I wrote, and then actually doing the work, gave me an unsettling feeling in my…

Post by Morgan Holm March 19, 2012
Tags:
, , ,
lock

Least Privilege Can Help Solve IT Negligence

The Ponemon Institute along with Trend Micro recently surveyed more than 700 ITprofessionals on the subject of the human factor in data breaches. According to the survey, 78 percent of respondents have experienced a data breach as a result of negligent or malicious employees or other insiders. This doesn’t surprise us here at BeyondTrust. We…

Post by Peter McCalister March 19, 2012
Picture-5

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Post by Sarah Lieber March 15, 2012
Tags:
, , , , ,
Good-better-best

Identity Management is Best in Enterprise Security

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could…

Post by Peter McCalister March 14, 2012
cs_patch-view-680x484

Patching is Still a Challenge? Yup.

eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be…

Post by Morey Haber March 14, 2012
Tags:
, , , , ,