BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

slam dunk

Uncontested Lay Up

Last week talked about the basics of how you can address the risk of insider attacks from former employees. A recent study of IT managers and network administrators conducted by Amplitude Research on behalf of VanDyke Software, shows a growing concern about insider threats, particularly unauthorized access by current and former employees. Unauthorized access by current and former employees was cited by 11% of the survey respondents, as a reason cited network intrusions, the 4th most frequent response.

Post by Peter McCalister October 27, 2011
sam2

Big Brother May Be Watching Sooner Than You Think

I recently read an article talking about the US Government wanting to start monitoring regional internet traffic on a large scale as a way to predict human behavior. The article goes on to state this, “…could enable the prediction of economic crises, political unrest and revolutions…” Wow! Good luck with that.

Post by Peter McCalister October 26, 2011
Accidental Harm

Don’t Be The Next WikiLeaks

Last year’s WikiLeaks scandal was an embarrassment for the government, drawing attention from every corner of the globe about the insecurity of its networks. Recently, President Obama ordered new computer security rules to government agencies handling classified information after months of investigating the events leading up to WikiLeaks.

Post by Peter McCalister October 25, 2011
Win 7 logo

AppLocker + Least Privilege = Magic

Writing blogs at 2am sometimes, has me asking myself dumb questions like “should I use a mathematics or a magician’s metaphor to kick off todays blog?” Answering myself sometimes generates inspiration and sometimes just means the lazy way out, like today when I chose both.

Post by Peter McCalister October 24, 2011
cloudlock1

Duqu, Son of Stuxnet, Destroyer of Worlds!

So, as everyone has hopefully heard by now, the world is indeed coming to an end because of a new piece of malware dubbed Duqu. Duqu is supposed to be based off of Stuxnet and therefore it makes it the scariest thing in cyber space or, as FoxNews.com said, “Stuxnet Clone ‘Duqu’: The Hydrogen Bomb of Cyberwarfare?”

Post by Marc Maiffret October 20, 2011
dunk

Slam Dunk

There aren’t many things in enterprise IT security that are easy enough to do to be called a slam dunk, but I may have one for you. A recent study of IT managers and network administrators conducted by Amplitude Research on behalf of VanDyke Software, shows a growing concern about insider threats, particularly unauthorized access by current and former employees.

Post by Peter McCalister October 20, 2011
thumb_default

Another First to Market by eEye: Vulnerability Management for Virtual Apps

More and more organizations are implementing virtualized solutions to reduce cost and gain strategic flexibility. As such, eEye continues to enhance Retina’s virtualized scanning capabilities to provide insight over the risks these assets raise for the business.

Post by Brad Hibbert October 20, 2011
book

Top 10 Reasons To Buy New Least Privilege Book

While you work hard to keep the bad guys out, a trusted employee, contractor or partner, can cause more damage than any outside hacker could ever do. This book will help you prevent this nightmare scenario by showing you how “less is more” when it comes to protecting your network and information assets.

Post by Peter McCalister October 19, 2011
cybersecurity1-resized-600.jpg

Time Is Of The Essence When Implementing Security Best Practices

Six years ago the U.S. Government Accountability Office (GAO) criticized the IRS for lax security practices. Now it would seem that six years is plenty of time to get the right security policies in place, but while the IRS is showing progress, it has yet to remediate 65 of the 88 previously reported weaknesses – and now the most recent GAO audit has turned up 37 new weaknesses to add to the list. This news affects every tax-paying citizen in the U.S., as all of our information is at risk, and it’s a good example of why every organization needs to be paying attention to their own security policies.

Post by Peter McCalister October 18, 2011
president

President Obama Endorses Least Privilege

We have showed that the insider threat is significant in this blog for the last 2 years and have even pointed out recently that it made the Wall St Journal among other well respected publications. But, when President Obama aims to stop WikiLeaks-style disclosures, then least privilege has really come of age.

Post by Peter McCalister October 17, 2011