BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Marc Maiffret: I’m Back at eEye

Posted July 12, 2010    Marc Maiffret

As you now know, I’m back at the company I co-founded, serving as CTO of eEye. It has been a few years, but my heart never left this company. To me, eEye has always been an idea greater than any product. It is the idea that modern societies will become increasingly dependent on technology, not just as something nice to have, but as a foundation for a way of life. Without a doubt, technology creates a better world through openness of information and access, which brings down barriers and allows for amazing advancements in many fields. As with all advancements and progress, however, there are going to be hurdles.

One hurdle is finding a balance between progress/innovation and security/reliability. This is compounded by the fact that now more than ever, security threats are not driven by teenage pranksters but by foreign governments and extremely well-funded criminal organizations. Make no mistake that when my colleagues and I show up to eEye every day, we feel not simply a part of a successful company, but part of a larger fight to protect a current and future way of life.

Having lived and breathed vulnerabilities for more than 13 years, my return to eEye continues my commitment to helping IT Security Professionals win the difficult battle of protecting their critical IT assets. Whether it was holding Microsoft accountable back in the day and seeing their dramatic shift into becoming one of the most secure software development companies or providing IT folks free tools to help combat the rampant computer worms of yester years – my passion has remained the same and my commitment to IT unwavering.

eEye will continue to lead through innovation. Some of today’s foundational vulnerability management concepts, such as the ability to perform non-intrusive scanning, were our innovations and appeared first in our products. It took years for our competitors to catch up and offer non-intrusive scanning. Today, eEye is the only major provider to offer a robust host-based VM agent that not only performs local active scans for security weaknesses, but also prevents zero-day attacks attempting to leverage vulnerabilities that do not yet have a patch.

We’ve innovated and led the way, but this doesn’t mean we sit back and rest on our successes. We have an aggressive plan to continue to pioneer this space. I’m thrilled to be back on the eEye team again and look forward to continuing the conversation. Good things to come for sure…

Tags:
,

Leave a Reply

Additional articles

dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,
bank theft img

The Vulnerabilities and Privileges of Carbanak Bank Thieves

Posted February 17, 2015    BeyondTrust Research Team

Recently Kaspersky released analysis of a series of significant breaches against financial institutions by a group they have dubbed Carbanak. The attacks go back over 2 years and estimates are that potentially $1 billion dollars in total were stolen from more than 100 financial institutions. In some cases the attackers were active in victim organizations between…

Tags:
, , ,