BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

img-android

Off the beaten Google Market

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by…

Post by Jerome Diggs July 10, 2012
Tags:
, , , , , , , ,
tablets-workplace

Driving Tablets to the Workplace

The adoption of tablets in enterprise environments is gaining traction. With the release of the new Microsoft tablet and talks of an iPad Mini scheduled to be released this fall, there is new attraction to the term BYOD. There are however, underlying security risks that executives need to take into consideration. The convenience of tablets…

Post by Peter McCalister July 9, 2012
error-dns

Can’t load this page? Check your DNS settings.

DNSChanger malware is on top of everyone’s mind this week since over 270,000 systems may be effectively losing internet access next Monday because of it. What is DNSChanger malware? The criminal organization behind DNSChanger is long gone, but the effects of the malware persist. DNSChanger malware, as the name says, changes your DNS server settings…

Post by Nate Hatcher July 6, 2012
Tags:
,
2012olympics

Top Cyber Threats at the 2012 Olympics

During the 2008 Beijing Olympic Games there were 12 million cyber-attacks reported per day. While taking a closer look towards this year’s Olympic Games, it’s important to focus on the possible threats and what we can do to avoid an attack. There’s no doubt that threat landscape has grown in the past four years, and…

Post by Peter McCalister July 2, 2012
google-bouncer

Google’s Bouncer Gets Roughed Up; Why You Should Care

With the increasing number of devices and applications in the enterprise, driven by the “consumerization of IT” and Bring Your Own Device (BYOD), companies are faced with the need for visibility as to what risk is being introduced to the enterprise. One might think this is a challenge the handset or mobile platform vendors are…

Post by Jerome Diggs June 28, 2012
Tags:
, , , , , ,
data-breach

Securing Your Reputation…because it’s Everything.

Consumer facing technology companies seem to be falling victim to data breaches more recently and as a result are coming under the microscope for not having proper security measures in place. With so much press focusing on this issue, not only are companies forced to become transparent in their security practices, their reputation is stained,…

Post by Peter McCalister June 25, 2012
insider-threat

How CEOs Can Protect Their Organization From the Inside-out

Enterprise security is a topic that makes headlines every day. From successful hack attacks to stories of unsuspecting or malicious employees putting their company’s data at risk, it would seem that no company is immune. In order to truly secure the companies we are responsible for, it’s helpful to put ourselves in the frame of…

Post by Peter McCalister June 22, 2012
kindle

June VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber June 21, 2012
Tags:
, , , , ,
img1

Chief Compliance Officers: Let Retina Threat Analyzer do the heavy lifting

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance….

Post by Peter McCalister June 20, 2012
img31

CCOs: Let Threat Analyzer do the heavy lifting

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. …

Post by Jerome Diggs June 20, 2012
Tags:
, , , , , , ,