BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
cloudlock1

Breaches, Breaches Everywhere, It Seems that Insiders Just Don’t Care!

Posted April 24, 2012    Peter McCalister

Let’s take a look at a few of the breaches being reported this week alone – all at the hand of insiders. The Utah Department of Health reported that about 780,000 claims had been accessed by a hacker. Then they added that 280,000 people’s social security numbers were stolen and 500,000 people had less-sensitive personal…

Categories:
General
samsung

Samsung NET-i Viewer Multiple Vulnerabilities

Disclosed April 24, 2012    Workaround Available
Vendors: Samsung
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
einstein

Call it Genius. Our Smart Groups Make Vulnerability Management Simple for Security Teams

Posted April 20, 2012    Morey Haber

eEye R&D has been hard at work on optimizing how our enterprise clients can manage and schedule assessments within Retina CS. These efforts will increase the efficiency of how our clients perform assessments across their IT infrastructure – be it their traditional server or desktop assets, or new technologies like mobile, virtual and cloud.

Categories:
Vulnerability Management
Tags:
, , , , , ,
microsoft

Microsoft Visual Studio Linker Vulnerability

Disclosed April 20, 2012    No Patch Available
Vendors: Microsoft
Vulnerability Severity: Medium
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
python

Python Hash Collision Denial of Service Vulnerability

Disclosed April 19, 2012    Fully Patched
Vendors: Python
Vulnerability Severity: Medium
Exploit Impact: Denial of Service
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
PBSE

The Key to Controlling Privileged User Activity? Centralize!

Posted April 18, 2012    Peter McCalister

Those of you who follow my blogs know that sudo – and the issues it presents IT organizations – is one of my favorite discussion topics. I suppose that’s because there is no shortage of stories that surface on a regular basis on the problems that can arise with sudo, and I feel compelled to…

Categories:
General
oracle

Oracle Database TNS Session Hijack

Disclosed April 18, 2012    Fully Patched
Vendors: Oracle
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
img

Insider Threats: What Can Be Done?

Posted April 17, 2012    Peter McCalister

IT security tends to focus on securing the network from external attacks, but little attention is given to malicious activity and human error within the company. According to InformationWeek’s 2012 Strategic Survey, company employees pose just as much of a threat as cyber thieves. How can this be addressed? A recent article by Dark Reading…

Categories:
General
img

eEye’s Patch Tuesday Assessment Now Available On Demand

Posted April 13, 2012    Sarah Lieber

Miss our live VEF webinar earlier this week? In case you did, I’ve put all of the content together for you below. Enjoy!

Categories:
Security Research
Tags:
, , , , ,
charliesheen-winning

March VEF Participant Wins a Kindle Fire

Posted April 11, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , , , ,