BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
error-dns

Can’t load this page? Check your DNS settings.

Posted July 6, 2012    Nate Hatcher

DNSChanger malware is on top of everyone’s mind this week since over 270,000 systems may be effectively losing internet access next Monday because of it. What is DNSChanger malware? The criminal organization behind DNSChanger is long gone, but the effects of the malware persist. DNSChanger malware, as the name says, changes your DNS server settings…

Categories:
Vulnerability Management
Tags:
,
2012olympics

Top Cyber Threats at the 2012 Olympics

Posted July 2, 2012    Peter McCalister

During the 2008 Beijing Olympic Games there were 12 million cyber-attacks reported per day. While taking a closer look towards this year’s Olympic Games, it’s important to focus on the possible threats and what we can do to avoid an attack. There’s no doubt that threat landscape has grown in the past four years, and…

Categories:
General
google-bouncer

Google’s Bouncer Gets Roughed Up; Why You Should Care

Posted June 28, 2012    Jerome Diggs

With the increasing number of devices and applications in the enterprise, driven by the “consumerization of IT” and Bring Your Own Device (BYOD), companies are faced with the need for visibility as to what risk is being introduced to the enterprise. One might think this is a challenge the handset or mobile platform vendors are…

Categories:
Security Research
Tags:
, , , , , ,
data-breach

Securing Your Reputation…because it’s Everything.

Posted June 25, 2012    Peter McCalister

Consumer facing technology companies seem to be falling victim to data breaches more recently and as a result are coming under the microscope for not having proper security measures in place. With so much press focusing on this issue, not only are companies forced to become transparent in their security practices, their reputation is stained,…

Categories:
General
insider-threat

How CEOs Can Protect Their Organization From the Inside-out

Posted June 22, 2012    Peter McCalister

Enterprise security is a topic that makes headlines every day. From successful hack attacks to stories of unsuspecting or malicious employees putting their company’s data at risk, it would seem that no company is immune. In order to truly secure the companies we are responsible for, it’s helpful to put ourselves in the frame of…

Categories:
General
kindle

June VEF Participant Wins a Kindle Fire

Posted June 21, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , , , ,
img1

Chief Compliance Officers: Let Retina Threat Analyzer do the heavy lifting

Posted June 20, 2012    Peter McCalister

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance….

Categories:
General
img31

CCOs: Let Threat Analyzer do the heavy lifting

Posted June 20, 2012    Jerome Diggs

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. …

Categories:
Vulnerability Management
Tags:
, , , , , , ,
IT-security

Alleviate Regulatory Compliance Strains on IT Pros

Posted June 19, 2012    Peter McCalister

As regulations continue to evolve and audits become even more comprehensive, many organizations are resource- strained trying to comply with critical government regulations. The reality is these regulations are unforgiving and non-compliance results in penalties, lost business and other indirect costs. A centralized solution to manage compliance provides a more actionable intelligence to available manpower…

Categories:
General
social-media-threats

Utilizing Social Media Platforms Carry Security Threats to Organizations

Posted June 15, 2012    Peter McCalister

Social Media is transforming the way businesses are branding and marketing their products, and with 900+ million users on Facebook, most of the workforce is participating. These platforms, including Twitter and LinkedIn provide a bridge for relaying information from companies to consumers, and the potential for future growth is prevalent. There are however security risks…

Categories:
General