BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Cutting Pay? Think Least Privilege First

Posted February 4, 2011    Peter McCalister

There was a big story in Network World about an IT staffer who sold his own company pirated software, used corporate servers for his own purposes and even downloaded credit card information.

In the comments you see how the story plays out. It’s not an isolated incident created by a psycho criminal IT staffer – it’s the kind of thing that someone convinces themselves is okay after years of wrestling with outsourcing, feeling underpaid and under appreciated and built-up anger towards the company.

The case with Goldman should show how money is a matter of perspective. One of their top-paid developers appear to have stolen code in an effort to sell it to a startup competitor. Paying more won’t make a theft less likely, but – as we saw in the recession – layoffs and cuts can certainly create a risk.

So this is the context in which I view a major story today in the Wall Street Journal, which was also widely reported elsewhere. Goldman is often criticized for overpaying their staff, especially highly paid executives. Now that they’re starting to trim those bonuses, will employees have the perspective to realize they were overpaid in the first place? Or find “alternative means” to secure cash flow or seek vengeance against the company they believe has wronged them.

Before cutting salaries or cutting staff, security needs to be a core component of planning (especially implementing a least privilege environment) for that and I’m sure Goldman did just as much.

Leave a Reply

Additional articles

Are Your Data Security Efforts Focused in the Right Area?

Posted January 28, 2015    Scott Lang

Vormetric Data Security recently released an insider threat report, with research conducted by HarrisPoll and analyzed by Ovum. Based on the survey responses, it is apparent that there is still a great deal of insecurity over data. However, the results also show that there may be misplaced investments to address those insecurities. I will explain…

Tags:
ghost

GHOST Vulnerability…Scary Indeed

Posted January 28, 2015    BeyondTrust Research Team

A vulnerability discovered by Qualys security researchers has surfaced within the GNU C Library that affects virtually all Linux operating systems. The vulnerability lies within the various gethostbyname*() functions and, as such, has been dubbed “GHOST.” GHOST is particularly nasty considering remote, arbitrary code execution can be achieved. In an effort to avoid taxing DNS lookups, glibc developers introduced…

Tags:
,
dave-shackleford-headshot

Your New Years Resolution: Controlling Privileged Users

Posted January 27, 2015    Dave Shackleford

Is 2015 the year you get a better handle on security? The news last year was grim – so much so, in fact, that many in the information security community despaired a bit. Really, the end-of-the-year infosec cocktail parties were a bit glum. OK, let’s be honest, infosec cocktail parties are usually not that wild…

Tags:
, , ,