Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


Privileged Account Management


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.

3d image Data Breach issues concept word cloud background

Experian/T-Mobile Data Breach: When 2 Days is not Enough

Posted October 2, 2015    Morey Haber

On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.


Who Moved My Front Door? (What is Privileged Account Management?)

Posted October 1, 2015    Nigel Hedges

Not too long ago, I was sitting in a room with a very fluffy sales guy. In between words such as “we’ll make this happen” and “leave it with me, I’ll get it sorted” he asked the question “What is Privileged Account Management”?


Why Customers Choose PowerBroker: End-to-End Coverage

Posted September 30, 2015    Scott Lang

In a survey of more than 100 customers, those customers indicated that BeyondTrust’s end to end privileged account management capabilities were a competitive differentiator versus other options in the privileged account management market.


On Demand Webinar: Managing Windows Least Privilege Access

Posted September 29, 2015    BeyondTrust Software

This webinar looks at using technologies native to Windows to minimize the risk of system and data compromise, including solving problems with legacy application compatibility in least privilege environments, application control, User Account Control (UAC), and embracing Microsoft’s application architecture (Windows Store apps) in Windows 8.


Removing Privileged Credentials From Windows Users Without Impacting Usability

Posted September 28, 2015    Russell Smith

IT has always been reluctant to remove administrative privileges from end users for several reasons. The first that comes to mind, and shouldn’t be overlooked, is the political challenges of such a move. Taking away a perceived privilege can be difficult, much like denying a person their freedom, so a change in IT policy has to be managed carefully to ensure users and management are onboard.

, , ,

Avoiding 4 “Gotchas” in Securing Network Devices

Posted September 24, 2015    Brad Hibbert

Cisco has indicated that hackers have compromised Cisco routers in several countries using valid administrative credentials or physical access to the devices to perform their malicious activities. In addition to weak physical controls, what are some other “gotchas” that you should be aware of when securing your network devices?

, , ,

The Year in Breaches: Can It Get Any Worse?

Posted September 21, 2015    Dave Shackleford

2015 has seen a staggering number of high profile data breaches and attacks, covering almost every major industry segment imaginable. There have been several major attacks on healthcare organizations, resulting in medical and patient data stolen.


Why Customers Choose PowerBroker: Reporting and Analytics

Posted September 17, 2015    Scott Lang

TechValidate research conducted a a survey of more than 100 BeyondTrust customers, those customers indicated that BeyondTrust’s reporting and analytics was a competitive differentiator versus other options in the privileged account management market.

, , ,

On Demand Webinar: How Hackers Can Steal Passwords

Posted September 11, 2015    BeyondTrust Software

This week, Security MVP, Paula Januszkiewicz, hosted a live webinar “How Hackers can Scratch off Secrets and Juicy Password Credentials from the Disk”. If you missed it, here is a quick expert and recording.