BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

img-oracle-logo

BeyondTrust & Oracle, The Perfect Partnership

No one will dispute that Oracle is a heavyweight when it comes to the relational database market, but Oracle is far more than a one trick pony.  Oracle has a plethora of enterprise products and hardware solutions that will fit the needs of almost any business.  However the key to success for many of the…

Post by BeyondTrust Product Management April 8, 2013
Tags:
, , , , , , ,
jpeg blog pic

Die Hard – Windows XP Against the World

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

Post by Mike Puterbaugh April 8, 2013
Tags:
, , ,
Closing the Door on Hackers

Closing the Door on Hackers – from the New York Times

I recently had the pleasure of contributing an Op-Ed piece to The New York Times. In the article, I talk about some of the aspects of cyber-security that I think are far too-often left out of mainstream media discussions. Specifically, the shared burden that all of us in the technology industry should feel in helping…

Post by Marc Maiffret April 5, 2013
Tags:
, , , ,
darkleech

A Brief Overview of Darkleech

A piece of malware, Darkleech, has been making the news rounds as of late. This one targets web servers, specifically Apache 2.2.2 and above. Instead of merely compromising a web server and uploading malicious content to be served to unsuspecting victims, Darkleech goes a step further by installing a special module that is loaded by…

Post by BeyondTrust Research Team April 4, 2013
Tags:
, , , , ,
trojanhorse

Vendor-Disclosed Zero Days and Targeted Trojans

Here at BeyondTrust, we are constantly keeping an eye on the underground parts of the internet, monitoring for things like zero day vulnerabilities and how malware authors are exploiting vulnerabilities in the wild. As such, we wanted to keep you apprised of a vulnerability that was addressed within VMware ESXi 5.0. A patch was released…

Post by BeyondTrust Research Team April 3, 2013
Tags:
, , , , , , ,
lucy2

Least Privilege and South Korea

No, this isn’t some editorial piece about the interrelationships of varying social strata in South Korean society and Gangnam Style. Despite how interesting that may be, we are instead taking a quick look at the latest “wiper” malware to strike fear in the hearts of CTOs and IT admins alike – DarkSeoul (or Jokra or…

Post by BeyondTrust Research Team March 26, 2013
Tags:
, , , ,
retinacs-img9

Creating a Gold Image SCAP Template for Windows

One of the challenges of Benchmark Configuration management is creating or modifying SCAP OVAL content to match your business policies and requirements. The following procedure is recommended to create custom Windows benchmarks for the Retina Network Security Scanner and Retina CS via local system policy, Local GPO, and Microsoft Security and Compliance Manager. For starters,…

Post by Bill Tillson March 21, 2013
Tags:
, , , ,
university-winchester

University of Winchester secures its applications with the help of BeyondTrust

A PowerBroker for Windows customer, University of Winchester, was recently highlighted in the Spring 2013 Government and Public Sector Journal (GPSJ). GPSJ is a great source for professionals in the government & public sectors, and informs them of the latest breaking news and exclusive footage. We are very happy and proud of our customer being…

Post by Sarah Lieber March 20, 2013
Tags:
, , ,

March VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Post by Qui Cao March 19, 2013
572884_503436863_124962594_n

BeyondTrust CTO sits down with IT Harvest’s Richard Steinnon

BeyondTrust’s CTO, Marc Maiffret, recently sat down with IT Harvest’s Richard Steinnon to discuss a wide range of topics surrounding the security industry today, including the accelerated rate of attacks we’re currently seeing, what our customers are doing to protect themselves, and they even discuss BeyondTrust’s new tagline, Beyond Traditional Security and what that means…

Post by Mike Puterbaugh March 17, 2013
Tags:
, , , , , , , , ,