BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

How To Prepare For When The SEC Comes Asking About Cybersecurity Risk | BeyondTrust CEO Featured in Forbes

Posted May 15, 2013    Mike Puterbaugh

Our CEO John Mutch was recently invited to share his thoughts on an increasingly talked-about subject in the IT industry – the potential for the SEC to assume oversight over public companies cyber risk programs – in essence asking them to report on the viability of their security and compliance operations – in the face of today’s hyper aggressive threat landscape.

John’s unique experience is which led Forbes to seek him out – having been the CEO of a public company and now leading BeyondTrust, he’s been on both sides of the cyber security table and offers his thoughts on how his public company CEO counterparts can be proactive, identifying some steps to take ahead of any potential SEC oversight.

You can find the entire article here.

forbes-logo_featuredimage

Want to learn more about how BeyondTrust’s security and compliance solutions for organizations of every industry and size, please visit our website.

Tags:
, , , , ,

Leave a Reply

Additional articles

flash-logo

Adobe Patches Zero-Day Flaw Being Exploited in the Wild

Posted January 22, 2015    BeyondTrust Research Team

Earlier this week, French malware researcher Kafeine reported on a new Adobe Flash zero-day vulnerability that was being exploited in the wild using the latest versions of the Angler Exploit Toolkit. “Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled”…

Tags:
, , , , ,

Your Data Security Strategy Starts with Deploying a Least Privilege Model (part 2 of 2)

Posted January 22, 2015    Scott Lang

In last week’s blog, we talked about how controls and accountability must be put into place so that only the right folks can access data and the systems on which that data resides, and that employing a least privilege model helps to achieve that and more. We’re using conclusions and data from a recent report…

Tags:
, , , ,
Larry-Brock-CISO

Basic Blocking and Tackling for Defending Against Advanced Targeted Attacks

Posted January 22, 2015    Larry Brock

With football season at its pinnacle at both the college and professional levels, the best teams continually focus on the fundamentals that make them successful. In security, we need to do the same.  It is okay for us to have a few key plays, especially in certain industries where we have to focus on unique…

Tags:
, , , , ,