BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
social-media-threats

Utilizing Social Media Platforms Carry Security Threats to Organizations

Posted June 15, 2012    Peter McCalister

Social Media is transforming the way businesses are branding and marketing their products, and with 900+ million users on Facebook, most of the workforce is participating. These platforms, including Twitter and LinkedIn provide a bridge for relaying information from companies to consumers, and the potential for future growth is prevalent. There are however security risks…

Categories:
General
media-coverage-98x98-98x97

Media RoundUp | Patch Tuesday June 2012

Posted June 14, 2012    Sarah Lieber

The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve…

Categories:
General
Tags:
, , , ,
patching

Patching Vulnerabilities the Right Way

Posted June 13, 2012    Peter McCalister

Malicious counterparts, the bad guys, are constantly finding ways to attack through flaws in a network. Perfection of software is novel, but by no means a reality. Vendors will provide patches to flaws and are available as soon as the discovery is made, but what you do with that is what is most important. Difficulties…

Categories:
General
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

Posted June 12, 2012    Peter McCalister

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Categories:
General
ibm-bt-webinar-logo

Upcoming webinar with IBM | 5 ways to protect your sensitive data in the cloud

Posted June 12, 2012    Peter McCalister

Please join us for a joint webcast featuring Ed Bottini, Cloud Ecosystem Program Director at IBM and Jim Zierick, EVP of Product Operations at BeyondTrust on June 26 at 9am-10am PDT. During this live webcast we’ll take a closer look at the needs that drive migration of data centers into the cloud, the role of…

Categories:
General
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

Posted June 12, 2012    BeyondTrust Research Team

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Categories:
General
Tags:
, , , , , ,
ibm-bt-webinar-logo

5 ways to protect your sensitive data in the cloud – webinar with IBM

Posted June 12, 2012    Sarah Lieber

In 2 weeks, we’ll be hosting a live webinar with IBM’s Ed Bottini, Cloud Ecosystem Program Director and our own, Jim Zierick, EVP of Product Operations to discuss ways to protect your sensitive data in the cloud. We know cloud security is on everybody’s mind so be sure to join us on Tuesday, June 26 at 9AM-10AM PDT….

Categories:
General
Tags:
, , , , , , ,
microsoft

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution

Disclosed June 12, 2012    Workaround Available
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
cloud-security-img

Sacrificing Security in the Cloud is Not an Option

Posted June 11, 2012    Peter McCalister

A current trending decision for more and more organizations is the adoption of cloud services. Without a doubt, there are returnable benefits to this investment: competitive cost advantage, allowing budgets to focus on technology innovation rather than infrastructure, and considerable gains in time management. With anything valuable, in this case data, there are definite security…

Categories:
General
linuxjournal-logo

Linux Journal Mentions PowerBroker Servers

Posted June 6, 2012    Peter McCalister

We always like to share with our readers when we’ve received media coverage so today I wanted to share with you all our latest mention, in Linux Journal. The most recent issue of Linux Journal mentioned BeyondTrust’s PowerBroker Servers Enterprise product. Here’s what Linux Journal had to say about PowerBroker: “PowerBroker provides an intuitive GUI…

Categories:
General