BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

IT-security

Alleviate Regulatory Compliance Strains on IT Pros

As regulations continue to evolve and audits become even more comprehensive, many organizations are resource- strained trying to comply with critical government regulations. The reality is these regulations are unforgiving and non-compliance results in penalties, lost business and other indirect costs. A centralized solution to manage compliance provides a more actionable intelligence to available manpower…

Post by Peter McCalister June 19, 2012
social-media-threats

Utilizing Social Media Platforms Carry Security Threats to Organizations

Social Media is transforming the way businesses are branding and marketing their products, and with 900+ million users on Facebook, most of the workforce is participating. These platforms, including Twitter and LinkedIn provide a bridge for relaying information from companies to consumers, and the potential for future growth is prevalent. There are however security risks…

Post by Peter McCalister June 15, 2012
media-coverage-98x98-98x97

Media RoundUp | Patch Tuesday June 2012

The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve…

Post by Sarah Lieber June 14, 2012
Tags:
, , , ,
patching

Patching Vulnerabilities the Right Way

Malicious counterparts, the bad guys, are constantly finding ways to attack through flaws in a network. Perfection of software is novel, but by no means a reality. Vendors will provide patches to flaws and are available as soon as the discovery is made, but what you do with that is what is most important. Difficulties…

Post by Peter McCalister June 13, 2012
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by Peter McCalister June 12, 2012
ibm-bt-webinar-logo

Upcoming webinar with IBM | 5 ways to protect your sensitive data in the cloud

Please join us for a joint webcast featuring Ed Bottini, Cloud Ecosystem Program Director at IBM and Jim Zierick, EVP of Product Operations at BeyondTrust on June 26 at 9am-10am PDT. During this live webcast we’ll take a closer look at the needs that drive migration of data centers into the cloud, the role of…

Post by Peter McCalister June 12, 2012
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Post by BeyondTrust Research Team June 12, 2012
Tags:
, , , , , ,
ibm-bt-webinar-logo

5 ways to protect your sensitive data in the cloud – webinar with IBM

In 2 weeks, we’ll be hosting a live webinar with IBM’s Ed Bottini, Cloud Ecosystem Program Director and our own, Jim Zierick, EVP of Product Operations to discuss ways to protect your sensitive data in the cloud. We know cloud security is on everybody’s mind so be sure to join us on Tuesday, June 26 at 9AM-10AM PDT….

Post by Sarah Lieber June 12, 2012
Tags:
, , , , , , ,
cloud-security-img

Sacrificing Security in the Cloud is Not an Option

A current trending decision for more and more organizations is the adoption of cloud services. Without a doubt, there are returnable benefits to this investment: competitive cost advantage, allowing budgets to focus on technology innovation rather than infrastructure, and considerable gains in time management. With anything valuable, in this case data, there are definite security…

Post by Peter McCalister June 11, 2012
linuxjournal-logo

Linux Journal Mentions PowerBroker Servers

We always like to share with our readers when we’ve received media coverage so today I wanted to share with you all our latest mention, in Linux Journal. The most recent issue of Linux Journal mentioned BeyondTrust’s PowerBroker Servers Enterprise product. Here’s what Linux Journal had to say about PowerBroker: “PowerBroker provides an intuitive GUI…

Post by Peter McCalister June 6, 2012