Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Microsoft Patch Tuesday Advanced Notification – May 2010

Posted May 6, 2010    Chris Silva

It’s that time again, and Microsoft has just released their advanced notification for next week’s Patch Tuesday. Luckily for those still recovering from the April Patch Tuesday, this month should be a bit easier. Microsoft has announced it will be releasing two patches.

They have been classified as:

* Critical (2 Patches)

All currently supported operating systems are affected this month, along with Office and VBA.

* Microsoft Windows 2000 (1 Patch)
* Windows XP (1 Patch)
* Windows Server 2003 (1 Patch)
* Windows Vista (1 Patch)
* Windows Server 2008 (1 Patch)
* Windows 7 (1 Patch)
* Windows Server 2008 R2 (1 Patch)
* Office XP (1 Patch)
* Office 2003 (1 Patch)
* Office 2007 (1 Patch)
* Microsoft Visual Basic for Applications (1 Patch)
* Microsoft Visual Basic for Applications SDK (1 Patch)

It looks like far less Mountain Dew will be consumed next week. And remember, if you are one of the few still running Vista SP0, you won’t be receiving a patch – be sure to upgrade your service pack first. Check back here on Tuesday for analysis of the patches once details are made public.

As usual, eEye Digital Security will be holding a vulnerability expert forum (VEF) on Wednesday May 12 at 11AM PDT. The vulnerability expert forum is a live webcast where the eEye research team will discuss these patches and additional security landscape topics. Be sure to sign up advance.

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.