BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

thumb_default

What Do You Think About eEye’s Zero-Day Tracker?

What Do You Think About eEye’s Zero-Day Tracker (www.eeye.com/zdt)?

Post by The eEye Research Team June 15, 2011
patch-tuesday

Microsoft Patch Tuesday – June 2011

Another even month, another huge security bulletin release by Microsoft. Those who took my advice and convinced their bosses to let them take vacation this month avoided 16 security bulletins – hopefully your co-workers will have them fully tested and deployed before you return. For those of us not sitting on a beach somewhere, there…

Post by Chris Silva June 14, 2011
logo

The University of Winchester Selects PowerBroker Desktops

The University of Winchester is an educational institution in the United Kingdom with a strong heritage and innovatice teaching model. Their 5,900+ students enjoy educational challenges in 17 different departments at the hands of over 650 staff members.

Post by Peter McCalister June 14, 2011
bigdata-98x98

Unified Vulnerability Management for Financial Organizations

If you are in the financial sector, how are you protecting your financial systems from tampering? If you are the CEO or CFO you must ensure that you financial reports are accurate, delivered in a timely fashion, and do not contain any information that was tampered with. This requires securing critical information technology systems that…

Post by Morey Haber June 14, 2011
eye in the sky_smaller-resized-600.jpg

Monitoring the Highly Privileged User

Today there are more insider data breaches than ever before. Verizon reports that in 2010, 48 percent of all breaches were attributed to users who abused their network privileges to maliciously access and distribute sensitive corporate information. Even minor policy violations, whether deliberate or inadvertent, the study finds, correlate directly with more serious abuse. At…

Post by Peter McCalister June 13, 2011
mcafee-logo-resized-600.jpg

McAfee Vulnerability Manager Utilizes Least Privilege

We recently announced the integration of our PowerBroker Server with McAfee’s Vulnerability Manager to help smooth compliance processes. The integration will give our customer’s the ability to better manage user access and privileges, while simultaneously expanding the coverage of security scans for a more complete, accurate view of IT security and compliance across physical, virtual…

Post by Peter McCalister June 10, 2011
broken chain

Insider Threats Aren’t Perpetrated By The Obvious: Part 2

Insider threats are a global phenomenon. Every company in every part of the world is subject to some level of insider threat. And guess what? Insider villains are just as unidentifiable in the UK as they are in the US. They appear just as innocuous in Poughkeepsie as they do in Perth. If you have…

Post by Peter McCalister June 9, 2011
cloudlock

Security and the Cloud

When enterprise applications and services migrate from the physical data center, organizations begin to lose visibility and control as the shared infrastructure model of the cloud forces IT to give up their traditional control over the network and system resources. As a result, many organizations and cloud providers will tell you that security continues to…

Post by Brad Hibbert June 8, 2011
newimproved

A Shiny New Internet Expands Address Space and CyberSecurity

Wednesday, June 8, engineers, technicians and content providers who rely on the internet’s viability will conduct a grand, global experiment. On World IPv6 Day, Internet Protocol Version 6 (IPv6) will go live for a day on the public internet – turning on everywhere for (at least) 24 hours. Hopefully, not too much will break in…

Post by Peter McCalister June 8, 2011
broken chain

Reporting Snapshots and Saved Views

I would like to tell you about a new feature recently added to Retina Insight. It may sound so simple but it solves a huge problem for businesses that like to perform ad-hoc reports.  If your one of those companies that likes to run reports ad-hoc, when you want, and review it compared to older…

Post by Morey Haber June 7, 2011