BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
factormythimage-98x98

Don’t believe everything you hear when it comes to security

Posted March 1, 2012    Sarah Lieber

Our good friend Ellen Messmer, recently published Network World article “13 security myths you’ll hear — but should you believe?”  , which listed common security myths shared and commented on by some of security’s leading experts and practitioners. Working at a security company, I work (and also sit) closely with a stellar team of researchers….

Categories:
General
Tags:
, , , ,
The New York Times Co. Post An 82 Percent Decline In 2nd Quarter Profi

The Front Page of the New York Times

Posted March 1, 2012    Peter McCalister

Another day, another security breach. From the government, to banks, to healthcare, to major retailers, to beloved consumer brands, the only thing that seems safe to say is that no one is immune to the threats of today’s Internet-connected world. With strict breach notification legislation and regulations and the tenacity of today’s media, information security…

Categories:
General
eeye-451logos

Missed it Live? Watch the “Big Security Data” Webinar with 451 Research & eEye Here.

Posted February 29, 2012    Sarah Lieber

Recently, 451 Research and eEye hosted the webinar “Turning Your Big Security Data into a Big Advantage”. This discussion was on the topic of “Big Data” and how it relates to today’s security landscape. Featuring 451’s Andrew Hay, we covered how today’s enterprise IT and security teams can best leverage their ‘big security data’ to make…

Categories:
General
Tags:
, , , , , , ,
lock

The Secret to Server Compliance (Hint: It’s Not Sudo)

Posted February 29, 2012    Peter McCalister

Having spent many years in the software security space, I’m often reminded of how often the word security is paired with compliance – or even interchanged, as if they’re the same thing. Security and compliance are, of course, different things. Security is about ensuring the safety of a company’s assets, protecting sensitive data, ensuring that…

Categories:
General
Wild, Wild West11

Surveying the Wild Wild West of Microsoft Server Administration

Posted February 28, 2012    Peter McCalister

I was the on the phone with a large company discussing their requirements surrounding the control of administrator access to Microsoft based servers and applications. Within 5 minutes it became clear of where the folks on the phone stood: “managing our Microsoft servers is akin to the wild wild west”. In this company there are…

Categories:
General

Complementing Privilege Identity Management (PIM) with the PowerBroker Management Suite

Posted February 28, 2012    Morgan Holm

While BeyondTrust has provided audit and recovery solutions for Active Directory for years, we are now seeing an increase in customer inquiries about Privilege Identity Management (PIM) challenges. This growing demand continues to be driven by security and compliance concerns and the need to prevent internal data breaches through the use of privileged accounts. Active…

Categories:
Privileged Account Management
Tags:
, ,
dod logo

Insider Threats Have Redefined Approach to Security

Posted February 28, 2012    Peter McCalister

n an attempt to combat the issue of insider threats, the Department of Defense has tapped PARC, a Xerox company focused on innovation and R&D, to spearhead a new effort called the Graph Learning for Anomaly Detection using Psychological Context (GLAD-PC). The goal is to create technology that can automatically identify the possibility of a…

Categories:
General
charliesheen-winning

February VEF Participant Takes Home a Kindle Fire.

Posted February 28, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , ,
rsa2012

3 Things To Look For At RSA 2012 In San Francisco

Posted February 27, 2012    Peter McCalister

Yep, It’s that time of year again when everyone interested in protecting their IT assets across physical, virtual and cloud environments converge on Mascone Center in San Francisco for the annual RSA conference. Expect over 350 vendors/sponsors and 16,500 other attendees clamoring for 220+ sessions. The theme this year is “The great cipher mightier than…

Categories:
General

Restoring/Undeleting a GPO

Posted February 24, 2012    Morgan Holm

Have you ever needed to undelete or rollback a GPO, but realized you forgot to back it up or could not remember what changes were made to it? Well, we have had many customers with the same problem. That’s why BeyondTrust Recovery for Active Directory also supports group policy objects (GPO). When group policies are…

Categories:
Privileged Account Management
Tags:
, , , ,