BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for June, 2012

google-bouncer

Google’s Bouncer Gets Roughed Up; Why You Should Care

With the increasing number of devices and applications in the enterprise, driven by the “consumerization of IT” and Bring Your Own Device (BYOD), companies are faced with the need for visibility as to what risk is being introduced to the enterprise. One might think this is a challenge the handset or mobile platform vendors are…

Post by Jerome Diggs June 28, 2012
Tags:
, , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
data-breach

Securing Your Reputation…because it’s Everything.

Consumer facing technology companies seem to be falling victim to data breaches more recently and as a result are coming under the microscope for not having proper security measures in place. With so much press focusing on this issue, not only are companies forced to become transparent in their security practices, their reputation is stained,…

Post by Peter McCalister June 25, 2012
insider-threat

How CEOs Can Protect Their Organization From the Inside-out

Enterprise security is a topic that makes headlines every day. From successful hack attacks to stories of unsuspecting or malicious employees putting their company’s data at risk, it would seem that no company is immune. In order to truly secure the companies we are responsible for, it’s helpful to put ourselves in the frame of…

Post by Peter McCalister June 22, 2012
kindle

June VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber June 21, 2012
Tags:
, , , , ,
img1

Chief Compliance Officers: Let Retina Threat Analyzer do the heavy lifting

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance….

Post by Peter McCalister June 20, 2012
img31

CCOs: Let Threat Analyzer do the heavy lifting

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. …

Post by Jerome Diggs June 20, 2012
Tags:
, , , , , , ,
IT-security

Alleviate Regulatory Compliance Strains on IT Pros

As regulations continue to evolve and audits become even more comprehensive, many organizations are resource- strained trying to comply with critical government regulations. The reality is these regulations are unforgiving and non-compliance results in penalties, lost business and other indirect costs. A centralized solution to manage compliance provides a more actionable intelligence to available manpower…

Post by Peter McCalister June 19, 2012
social-media-threats

Utilizing Social Media Platforms Carry Security Threats to Organizations

Social Media is transforming the way businesses are branding and marketing their products, and with 900+ million users on Facebook, most of the workforce is participating. These platforms, including Twitter and LinkedIn provide a bridge for relaying information from companies to consumers, and the potential for future growth is prevalent. There are however security risks…

Post by Peter McCalister June 15, 2012
media-coverage-98x98-98x97

Media RoundUp | Patch Tuesday June 2012

The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve…

Post by Sarah Lieber June 14, 2012
Tags:
, , , ,
patching

Patching Vulnerabilities the Right Way

Malicious counterparts, the bad guys, are constantly finding ways to attack through flaws in a network. Perfection of software is novel, but by no means a reality. Vendors will provide patches to flaws and are available as soon as the discovery is made, but what you do with that is what is most important. Difficulties…

Post by Peter McCalister June 13, 2012