BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

img12

PowerBroker Databases Best Practices for HIPAA Statutes

Protecting the electronic health information means any information created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an…

Post by Peter McCalister August 14, 2012
patch-tuesday

August 2012 Patch Tuesday – Oracle PWNS Microsoft, story at 11!

Oracle can be the butt of a lot of jokes when it comes to software security researchers. This Patch Tuesday, however, Oracle has taken things to the next level by not just having poorly secured products of their own but also providing the world with a remote vulnerability within Microsoft Exchange. Microsoft security bulletin MS12-058…

Post by Marc Maiffret August 14, 2012
oracle

Oracle Gets in the Patch Tuesday Mix

While the entire security world looks to Microsoft on Patch Tuesday, we’re also keeping an eye on other critical technology vendors for their vuln announcements as well. Today, as part of our Patch Tuesday audit update, we’ll also be adding two new audits to our Retina scan engine to close a security vulnerability that can enable…

Post by Brad Hibbert August 14, 2012
UAC Message Box

Sneak Peek at PowerBroker Desktops 5.3 — Message Box Enhancements

PowerBroker Desktops 5.3 will be released this month, and as a follow up to our previous article, this article describes additional enhancments to end user message boxes that provide users with more flexibility and functionality. The first thing we did was give you additional control over the content that can be put into message boxes…

Post by Peter McCalister August 9, 2012
Token Tab

Sneak Peek at PowerBroker Desktops 5.3 UI Enhancements

Over the past several months, our development team in North Andover, MA, has been working hard on the next release of PowerBroker Desktops, which we plan on releasing in late August. The overarching theme for this release is enhancements to usability and aesthetics. Over the next several days, we will be posting a series of…

Post by Peter McCalister August 8, 2012
blackholetoolkit1

BlackHole toolkit targets Microsoft XML Core Services flaw

Blackhole is a popular exploit kit used to inject malware onto PCs that visit an exploited site, or are redirected to such a site from another, compromised website.  As hackers get bolder they use these types of toolkits to compromise computer networks.  This allows less sophisticated individuals and organizations to compromise computer networks since these…

Post by Sarah Lieber August 1, 2012
Tags:
, , , , , , , ,
winning

July VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber July 31, 2012
Tags:
, , , , ,
whitehouse

Capitol Hill is Moving on Cyber Security Bill

Will government intervention help reduce the number of security attacks on our nation’s infrastructure or is the proposed Cyber Security Act too restrictive on private business causing forced transparency of operations and raised costs? The Cyber Security Act 2012 Bill has been floating around for months and is now backed by President Obama. Sen. Joe…

Post by Peter McCalister July 23, 2012
Picture 3

July Patch Tuesday Assessment On Demand

Miss our live VEF webinar earlier this month? In case you did, I’ve put all of the content together for you below. Enjoy!

Post by Sarah Lieber July 22, 2012
Tags:
, , ,
new-kids-on-the-block

Create custom audits for Android devices. Come on, all the cool kids are doing it.

Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit….

Post by Carter Jones July 18, 2012
Tags:
, , , , , ,