BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Chief Compliance Officers: Let Retina Threat Analyzer do the heavy lifting

Posted June 20, 2012    Peter McCalister

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. I’m sure there are many debates that can go back and forth of the efficacy of either case depending on industry, regulatory requirements, the degree of a breach, etc. but in MANY cases the former is far more costly than the latter when you think of legal risks from class action lawsuits (incurred following a breach), cost of notification to customers, brand image, potential stock price fallout not to mention the cost of consultants and technology to remediate the problem.

Retina Insight provides organizations with an in-depth enterprise view so compliance teams can make informed decisions on where their highest risk areas are located, as provided in our Threat Analyzer Asset Risk Heat Map. In the example below we see across the organization that the Cricklewood data center presents the highest risk (based on Total Asset Score) within the organization and is a natural starting point for corporate risk reduction.

Continue reading the entire article originally posted here.

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,