BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for June, 2012

patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by Peter McCalister June 12, 2012
ibm-bt-webinar-logo

Upcoming webinar with IBM | 5 ways to protect your sensitive data in the cloud

Please join us for a joint webcast featuring Ed Bottini, Cloud Ecosystem Program Director at IBM and Jim Zierick, EVP of Product Operations at BeyondTrust on June 26 at 9am-10am PDT. During this live webcast we’ll take a closer look at the needs that drive migration of data centers into the cloud, the role of…

Post by Peter McCalister June 12, 2012
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by BeyondTrust Research Team June 12, 2012
Tags:
, , , , , ,
ibm-bt-webinar-logo

5 ways to protect your sensitive data in the cloud – webinar with IBM

In 2 weeks, we’ll be hosting a live webinar with IBM’s Ed Bottini, Cloud Ecosystem Program Director and our own, Jim Zierick, EVP of Product Operations to discuss ways to protect your sensitive data in the cloud. We know cloud security is on everybody’s mind so be sure to join us on Tuesday, June 26 at 9AM-10AM PDT….

Post by Sarah Lieber June 12, 2012
Tags:
, , , , , , ,
cloud-security-img

Sacrificing Security in the Cloud is Not an Option

A current trending decision for more and more organizations is the adoption of cloud services. Without a doubt, there are returnable benefits to this investment: competitive cost advantage, allowing budgets to focus on technology innovation rather than infrastructure, and considerable gains in time management. With anything valuable, in this case data, there are definite security…

Post by Peter McCalister June 11, 2012
linuxjournal-logo

Linux Journal Mentions PowerBroker Servers

We always like to share with our readers when we’ve received media coverage so today I wanted to share with you all our latest mention, in Linux Journal. The most recent issue of Linux Journal mentioned BeyondTrust’s PowerBroker Servers Enterprise product. Here’s what Linux Journal had to say about PowerBroker: “PowerBroker provides an intuitive GUI…

Post by Peter McCalister June 6, 2012
match-flame

Flame Malware Burns a Little Brighter

Did you know that Microsoft’s Terminal Server Licensing Service (we’ll call it TSLS for convenience) generated certificates that could be used to sign code? No? Neither did Redmond. Flame leveraged a “0day” (zero day) within TSLS to sign its own code, allowing it to appear as if the code came from Microsoft. This allowed Flame…

Post by Peter McCalister June 5, 2012
flame-98x98

Flame Burns a Little Brighter

Did you know that Microsoft’s Terminal Server Licensing Service (we’ll call it TSLS for convenience) generated certificates that could be used to sign code? No? Neither did Redmond. Flame leveraged a “0day” (zero day) within TSLS to sign its own code, allowing it to appear as if the code came from Microsoft. This allowed Flame…

Post by BeyondTrust Research Team June 4, 2012
Tags:
, , ,
WindowsITPro_200x58

Windows IT Pro Rates PowerBroker Desktop 4 out of 5 Stars

Windows IT Pro has published its review of PowerBroker Desktops, Windows Edition. The review is quite favorable and gave PowerBroker Desktop a 4 out of 5 star rating, saying PowerBroker Desktops is an easier way to protect users’ computers. An excerpt below: “PowerBroker does the heavy lifting for you. Instead of having to relax NTFS…

Post by Peter McCalister June 1, 2012
rsa-archer-egrc-2-680x393

Now Available! Direct Integration from Retina CS into RSA Archer eGRC

Yet another first for BeyondTrust and eEye Digital Security. Our combined companies are proud to release our first new direct integration from Retina CS into RSA Archer eGRC. The business value provides comprehensive vulnerability management data directly into Archer’s Threat Management system. Using direct database access from Archer’s Integration System, the eGRC platform harvests asset…

Post by Morey Haber June 1, 2012
Tags:
, , , , , ,