BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
dod logo

Insider Threats Have Redefined Approach to Security

Posted February 28, 2012    Peter McCalister

n an attempt to combat the issue of insider threats, the Department of Defense has tapped PARC, a Xerox company focused on innovation and R&D, to spearhead a new effort called the Graph Learning for Anomaly Detection using Psychological Context (GLAD-PC). The goal is to create technology that can automatically identify the possibility of a…

Categories:
General
charliesheen-winning

February VEF Participant Takes Home a Kindle Fire.

Posted February 28, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , ,
rsa2012

3 Things To Look For At RSA 2012 In San Francisco

Posted February 27, 2012    Peter McCalister

Yep, It’s that time of year again when everyone interested in protecting their IT assets across physical, virtual and cloud environments converge on Mascone Center in San Francisco for the annual RSA conference. Expect over 350 vendors/sponsors and 16,500 other attendees clamoring for 220+ sessions. The theme this year is “The great cipher mightier than…

Categories:
General

Restoring/Undeleting a GPO

Posted February 24, 2012    Morgan Holm

Have you ever needed to undelete or rollback a GPO, but realized you forgot to back it up or could not remember what changes were made to it? Well, we have had many customers with the same problem. That’s why BeyondTrust Recovery for Active Directory also supports group policy objects (GPO). When group policies are…

Categories:
Privileged Account Management
Tags:
, , , ,

Oops! Active Directory Recycle Bin Not Enabled

Posted February 24, 2012    Morgan Holm

Just a reminder for all you PowerBroker Auditor users: to recover from accidental changes and deletions, simply find the event with the interactive console and click “Rollback.”

Categories:
Privileged Account Management
Tags:
, ,
rsa2012

Where Does Employee Trust Fit in Information Security

Posted February 24, 2012    Peter McCalister

Next week I will be attending the RSA Conference in San Francisco. As a product management professional who enjoys investigating innovative emerging technologies, I decided to see what a few of the pre-show pundits had to say about the upcoming conference. I just finished listening to a Search Security podcast that discussed what the speakers…

Categories:
General
balance1

Balancing Administrator Privileges for Help Desk Savings

Posted February 23, 2012    Peter McCalister

Next week I will be attending the RSA Conference in San Francisco. As a product management professional who enjoys investigating innovative emerging technologies, I decided to see what a few of the pre-show pundits had to say about the upcoming conference. I just finished listening to a Search Security podcast that discussed what the speakers…

Categories:
General
database

Top 10 Reasons To Implement Least Privilege For Apps & Databases

Posted February 22, 2012    Peter McCalister

Taking a more tongue-in-cheek approach to highlighting the types of privilege misuse that occurs daily in applications and databases inside most organizations, I thought that a top-ten list approach might appeal to you as well. How may of these have you seen throughout your organization? #10—Sam, the CSO, can now sleep nights knowing that inappropriate…

Categories:
General

10 Things You Should Know About PowerBroker Auditor for Active Directory

Posted February 21, 2012    Morgan Holm

Rapid installation and minimal training with no reliance on native auditing tools Unmatched scalability and performance (“Our typical traffic volume is more than 1.5 million events per day and Blackbird has scaled-up effortlessly,” Josh Munn, Senior Systems Administrator, The University of Mississippi Medical Center) Real-time collection and alerting for active directory and group policy changes…

Categories:
Privileged Account Management
Tags:
, , ,
ca flag

The Proper Insider Threat Precautions Could Save You

Posted February 21, 2012    Peter McCalister

The new California Data Breach Notification Bill (SB 24) mandating that holders of data notify consumers when their personal data has been breached went into effect at the beginning of this year. The bill has been in the works for several years and as the number of exposed personal records continues to climb (currently estimated…

Categories:
General