BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
PBSE

The Key to Controlling Privileged User Activity? Centralize!

Posted April 18, 2012    Peter McCalister

Those of you who follow my blogs know that sudo – and the issues it presents IT organizations – is one of my favorite discussion topics. I suppose that’s because there is no shortage of stories that surface on a regular basis on the problems that can arise with sudo, and I feel compelled to…

Categories:
General
oracle

Oracle Database TNS Session Hijack

Disclosed April 18, 2012    Fully Patched
Vendors: Oracle
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
img

Insider Threats: What Can Be Done?

Posted April 17, 2012    Peter McCalister

IT security tends to focus on securing the network from external attacks, but little attention is given to malicious activity and human error within the company. According to InformationWeek’s 2012 Strategic Survey, company employees pose just as much of a threat as cyber thieves. How can this be addressed? A recent article by Dark Reading…

Categories:
General
img

eEye’s Patch Tuesday Assessment Now Available On Demand

Posted April 13, 2012    Sarah Lieber

Miss our live VEF webinar earlier this week? In case you did, I’ve put all of the content together for you below. Enjoy!

Categories:
Security Research
Tags:
, , , , ,
charliesheen-winning

March VEF Participant Wins a Kindle Fire

Posted April 11, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , , , ,
patch-tuesday

Microsoft Patch Tuesday – April 2012

Posted April 10, 2012    Chris Silva

April is upon us, and for Patch Tuesday Microsoft delivered six security bulletins, patching a total of eleven vulnerabilities. MS12-027 is the most urgent, as Microsoft has rated it critical and has stated that there are targetted attacks leveraging this vulnerability – patch this one first.

Categories:
Security Research
insiderbreachlawsuit

People are Less Forgiving of Insider Threats than Outside Hacks

Posted April 6, 2012    Peter McCalister

A new study says that people are more likely to file a lawsuit against a company that experienced a data breach if that breach was the result of unauthorized disclosure or disposal of data than if the breach happened due to an outside hack. The study, titled Empirical Analysis of Data Breach Litigation, says “plaintiffs…

Categories:
General
dell

Quest vWorkspace “pnllmcli.dll” ActiveX Arbitrary Overwrite Vulnerability

Disclosed April 5, 2012    Workaround Available
Vendors: Quest Software (Dell)
Vulnerability Severity: Medium
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
dell

Quest Toad ActiveX Vulnerability

Disclosed April 5, 2012    Workaround Available
Vendors: Quest Software (Dell)
Vulnerability Severity: Medium
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
vista-patch-bandaid-sp1

Firewalls Not Preventing Data Breaches? Try a Dose of Least Privilege

Posted April 4, 2012    Peter McCalister

An article was published last month indicating a malware-infected computer at ConnecticutCollege was the cause of the breach of 18,000 social security numbers of teachers, employees, and student workers. According to the report, “a computer in the CCSU business office was infected in December, and sat on the system for eight days before it was…

Categories:
General