BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
retina-cs-calendar

Retina CS 4.5 – Calendars and Vulnerability Smart Rules

Posted May 21, 2013    Morey Haber

One of the many challenges facing Product Management today is addressing client feature requests. Often times, the request for a specific business problem does not translate to other customers or markets. Other times, the request is so complicated to explain, it takes multiple discussions to figure out the root problem and to figure out if…

Categories:
Vulnerability Management
Tags:
, , , ,
session-viewer-pbw

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Posted May 16, 2013    Peter Beauregard

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker…

Categories:
Privileged Account Management
Tags:
, , , , ,
forbes-logo_featuredimage

How To Prepare For When The SEC Comes Asking About Cybersecurity Risk | BeyondTrust CEO Featured in Forbes

Posted May 15, 2013    Mike Puterbaugh

Our CEO John Mutch was recently invited to share his thoughts on an increasingly talked-about subject in the IT industry – the potential for the SEC to assume oversight over public companies cyber risk programs – in essence asking them to report on the viability of their security and compliance operations – in the face…

Categories:
General
Tags:
, , , , ,
retina-virtual-graph

BeyondTrust Performs Vulnerability Assessment of VMware Solutions Better Than Anyone Else!

Posted May 15, 2013    Morey Haber

Retina from BeyondTrust performs vulnerability assessment of VMware solutions so incredibly, extremely, amazingly much better than anyone else…. Ok, I’m in product management and maybe marketing isn’t my forte, but let me explain to you in all seriousness why I think we’ve done something pretty special here. First, let me pose some real world questions…

Categories:
Vulnerability Management
Tags:
, , , , ,
microsoft

Windows Kernel Privilege Elevation Vulnerability

Disclosed May 15, 2013    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Elevation of Privilege
Exploit Availability:
Categories:
Zeroday Tracker

May 2013 Patch Tuesday

Posted May 14, 2013    BeyondTrust Research Team

In May’s Patch Tuesday, the fixes provided by Microsoft mostly target client-sided applications, along with a fix for a server-sided component. These 10 patches address 33 vulnerabilities in Internet Explorer (including the recent 0day), .NET, Lync, Publisher, Word, Visio, Windows Essentials, Kernel mode drivers, and the HTTP.sys component. Two patches were released this month for…

Categories:
Security Research
novell

Novell Client Local Elevation of Privilege Vulnerability

Disclosed May 10, 2013    Fully Patched
Vendors: Novell
Vulnerability Severity: Medium
Exploit Impact: Elevation of Privilege
Exploit Availability:
Categories:
Zeroday Tracker
RNSS-Video-Screenshot

Data Discovery using the Retina Network Security Scanner

Posted May 9, 2013    Morey Haber

One of the challenges facing every organization is locating where Personally Identifiable Information (PII) resides on workstations and servers. This data, by nature, is sensitive. However, if this data is not properly being tracked, secured, or even encrypted it can result in data loss. This type of data loss can result in a violation of…

Categories:
Vulnerability Management
Tags:
, , , , , ,
Virtual Insecurity Infographic FINAL

Virtual Insecurity, and Ways to Combat It

Posted May 8, 2013    Mike Puterbaugh

Stating the obvious, our customers continue to make investments in virtualization. To support them, BeyondTrust has always been on the leading edge of providing tools and solutions in that regard. Whether it for managing privileges on virtual hosts, or scanning private cloud assets for flaws, BeyondTrust has always been at the forefront of security and…

Categories:
General
Tags:
, , ,
adobe

Adobe ColdFusion Arbitrary File Read Vulnerability

Disclosed May 8, 2013    Fully Patched
Vendors: Adobe
Vulnerability Severity: Medium
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker