BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Intentional Harm

Layoffs May Lead to Insider Attacks

Employee terminations are, unfortunately, a necessary evil for corporations. In a time of recession, layoffs are more copious and often leave those affected angry and upset. It should come as no surprise that a small minority of those cases has led to disastrous consequences for former employers because of some terminated employee backlash. Just recently,…

Post by Peter McCalister January 31, 2012
zappos

Just One Open Server Is Enough For Misuse Of Privilege

Gambling on the odds may be fine for a weekend in Las Vegas, but do you really want to take that same risk with your precious corporate information assets? Zappos learned the hard way what happens when even one server is at risk from a security perspective. A recent Dark Reading articled entitled “Zappos Dealing…

Post by Peter McCalister January 30, 2012
charliesheen-winning

January VEF winner announced. Takes home an Amazon Kindle Fire.

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber January 26, 2012
Tags:
, , ,
Bill

I’m Too Busy To Worry About It

You ever say this to yourself? Sure, we all have at one point or another; and that’s understandable. Between the stress we sometimes feel at work and home, it’s easy to throw your hands up and think, this is just the way it is, these are the problems I have to deal with. But think…

Post by Peter McCalister January 26, 2012
lock

You Lock Your Cars And Homes- Why Not Your Enterprise?

There are some things in life that are valuable and vitally important to our success and safety. Things like cars and homes, for example. They are important assets that aren’t to be left open for just anyone to access. You don’t think twice about locking them and taking precautions to protect them from thieves, intruders,…

Post by Peter McCalister January 25, 2012
Royal-Liverpool-Univ-Hospital

Insider Threat Or Stalker?

We have talked about the various types of insider threats – accidental or malicious – at great length and here is a prime example of just how weird things can get when an employee decides to abuse privilege. Juliah Kechil, a former healthcare assistant at Royal Liverpool university hospital has been fined and also ordered…

Post by Peter McCalister January 24, 2012
book

4 Bad Habits For IT To Kick in 2012

Isn’t it amazing how easy it is to adopt bad habits? The crazy thing is that no one is immune; they plague each and every one of us. Whether we were taught incorrect practices or are just looking for shortcuts to make our lives/jobs/situations easier, each of us yields to poor patterns at some point…

Post by Peter McCalister January 23, 2012
ciso-up-at-night-98x98

5 Things That Keep a CISO up at Night

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most…

Post by Sarah Lieber January 20, 2012
Tags:
, , , , , , , , , ,
NYR

News Year’s Resolution For 2012: Practice Safe Security

Admit it. You follow certain practices within your IT environment you know to be risky from a security perspective. You’re not alone. In fact, the number of IT professionals who routinely and knowingly take such risks is surprisingly high. Often the rationale is reasonable: you have limited resources and more IT projects than your staff…

Post by Peter McCalister January 20, 2012
img

Post-Password Predictions And What They Mean For You

The list of problems with passwords has been documented over and over again: Users keeping spreadsheets of their personal passwords, using ordinary everyday words, keeping their passwords on sticky notes, or constantly harassing the IT department for help with forgotten passwords–the list goes on and on. Even clever password creation and rating sites have been…

Post by Peter McCalister January 18, 2012