BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

perimeter within

Security from Data Breaches Start from Within

Keeping the bad guys out is what comes to mind for a lot of us when we think of securing our companies’ IT environment. And to be honest, this mindsit might very well be the reason we hear about so many data breaches. Companies are getting hit with breach and breach of sensitive information despite…

Post by Peter McCalister March 22, 2012
wokka-wokka-98x98

In Configuration We [Still] Trust

It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These…

Post by Marc Maiffret March 22, 2012
Tags:
, ,

PowerBroker Recovery for Active Directory Takes the Pain and Uncertainty out of AD Recovery

I remember back in school working on an essay for days, saving it to my local 5 ¼ inch floppy just to find a disk error when trying to print it the day before it was due. Remembering all that I wrote, and then actually doing the work, gave me an unsettling feeling in my…

Post by Morgan Holm March 19, 2012
Tags:
, , ,
lock

Least Privilege Can Help Solve IT Negligence

The Ponemon Institute along with Trend Micro recently surveyed more than 700 ITprofessionals on the subject of the human factor in data breaches. According to the survey, 78 percent of respondents have experienced a data breach as a result of negligent or malicious employees or other insiders. This doesn’t surprise us here at BeyondTrust. We…

Post by Peter McCalister March 19, 2012
Picture-5

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Post by Sarah Lieber March 15, 2012
Tags:
, , , , ,
Good-better-best

Identity Management is Best in Enterprise Security

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could…

Post by Peter McCalister March 14, 2012
cs_patch-view-680x484

Patching is Still a Challenge? Yup.

eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be…

Post by Morey Haber March 14, 2012
Tags:
, , , , ,
patch-tuesday

Microsoft Patch Tuesday – March 2012

March – the month that brings us spring training, NCAA March Madness, Pi Day, and St. Patrick’s Day (including the requisite Shamrock Shake). To go along with these exciting events, Microsoft has chipped in with six security bulletins for the March edition of Patch Tuesday.

Post by Chris Silva March 13, 2012
male_user_help_256

Do You Know Where Your Linux/UNIX Users Are?

Or even who they are? Sure you do, you say. You have someone responsible for managing Linux and UNIX user accounts. She manages the user store, grants user access to specific Linux/UNIX servers, and assigns specific privileges to users on those servers. When someone leaves the company, she makes sure the specific user accounts are…

Post by Peter McCalister March 13, 2012
img

Insider Threats Can Start from the Outside, Too

The term insider threats used to spark images of malicious employees stealing copies of filesor looking at information they weren’t supposed to, but in today’s complex world of technology, insider threats have evolved. According to a preliminary version of the Verizon 2012 Data Breach Investigations Report, 92 percent of attacks analyzed were external in origin,…

Post by Peter McCalister March 12, 2012