Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


Privileged Account Management


On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

, ,

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

, ,
Palo Alto firewall events are automatically correlated to assets and normalized as Attack, Scanner (Vulnerability), and Malware threats

Threat analytics is more fun when you do it with friends

Posted July 20, 2015    Chris Burd

At BeyondTrust, we know our customers’ lives are a lot easier when their security products play nicely with one another. That’s why we think “outside the silo” when building our privileged account management and vulnerability management solutions – and it’s also why the majority of our solutions operate under the BeyondInsight risk management platform. Think…

, , , , ,

PowerBroker for Windows v6.8: New Enhancements to Simplify Deployments and Management

Posted July 17, 2015    Scott Lang

We’re pleased to announce the availability of PowerBroker for Windows version 6.8, released today and building on patented least privilege management capabilities. This release is packed with enhancements meant to further simplify least privilege management and deployments. Read on to learn what’s new.


Black Hat Survey: Gap Between Security Concerns and Resources – a Maturity Problem

Posted July 16, 2015    Scott Lang

In advance of the upcoming Black Hat conference, the organization released a first-ever research report based on results of a survey to prior conference attendees. The report, titled, “2015: Time to Rethink Enterprise IT Security”, “reveals a significant gap between the priorities and concerns as well as the actual expenditure of security resources in the average enterprise.”

, , ,

An Expert’s Guide: Secure Windows Server PowerShell Remoting

Posted July 15, 2015    Russell Smith

Learn how PowerShell Remoting can be configured to provide a secure means of remote administration, how to control which users can access PowerShell remote endpoints, and additionally how to secure PowerShell Remoting outside of an Active Directory environment using SSL.


The Current State of the Cyber Insurance Market and its Role in Managing Cyber Risk

Posted July 14, 2015    Tracie Grella

Cyber insurance is the fastest growing insurance product today, it’s development spurred on by several large data breaches covered in the news the past year and a half. As with any new product/service, there is a lot of variation and evolution in the coverage; here is what you need to know.

, , ,

Compromised Contractor Credential Leads to Largest Cyberattack into the Systems of the US Government

Posted July 13, 2015    Brad Hibbert

The damage from the US federal government’s Office of Personnel Management data breach is only getting worse. First disclosed last month and affecting 4.2 million US federal employees, the number of compromised records now has reached 21.5 million people, including those who received government background checks for the past 15 years.

, , ,

On Demand Webinar: Preserving and Protecting Privileged Passwords

Posted July 9, 2015    BeyondTrust Software

On demand webinar Webinar discusses the changing state of industry security, how current trends impact privileged accounts and their passwords, and what steps IT should be taking to ensure only those who should have access, do.

, , ,
Cavalancia-Headshot - Medium

Protecting Privileged Passwords: a “Past the Password” Perspective

Posted July 6, 2015    Nick Cavalancia

Webinar discussing the realities of today’s state of security using some of the most recent (and respected) reports in the industry, and look at what steps you should be taking to properly protect your privileged passwords.