BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

smartphone4-resized-600.jpg

Managing Mobile Workers

According to a Runzheimer survey released last month, 45 percent of today’s workforce is mobile. For companies, having such an extensive number of remote employees can provide a number of great advantages, but it has plenty of downsides too.

Post by Peter McCalister May 19, 2011
kindle

Video Killed The Radio Star For Least Privilege

On August, 1, 1981 at 12:01am EST in the United States the first video played on MTv was the Buggle’s “Video Killed The Radio Star.” This was heralded as the video age and music has never been the same since. In February of 2005, YouTube launched as the premier video sharing site on the web and communication has not been the same since.

Post by Peter McCalister May 18, 2011
PBIS-resized-600

Unified Vulnerability Management for Retailers

What do retailers worry about the most?  Outside of remaining profitable and competitive, theft is always a concern.  Theft can occur for a retailer in a variety of ways.  Everything from shoplifting, hijacking cargo shipments, to electronic identity theft.  Thieves are always trying to find new ways of stealing “something” and making money from it….

Post by Morey Haber May 17, 2011
cloud

Outlook for Tomorrow is Cloudy But Confused

The recent report by the Ponemon Institute on the Security of Cloud Computing Providers offered what appears to be some surprising results. According to the study, “the majority of cloud computing providers do not consider security as one of their most important responsibilities.”

Post by Peter McCalister May 17, 2011
Team

The Intersection of Policy, Technology & People

Lot’s of things come in threes. You can’t get fire unless you have heat, fuel and oxygen and a great swing just needs a tree, a tire and some rope. Turns out that you also can’t get to a least privilege environment unless you’ve dealt with the intersection of policy, technology and people.

Post by Peter McCalister May 16, 2011
insiderbreachlawsuit

The Cost of a Data Breach Just Went Up

Today, enterprises are hopefully well aware of the high price they could pay if they experience a breach in the confidential data of their customers. But now, in addition to applicable remediation expenses and a whole lot of bad publicity, companies may also have to fear the financial wrath of the government, as lawmakers have begun to institute fines for businesses that fail to secure their customers’ personal information.

Post by Peter McCalister May 13, 2011
cloudlock-1

Liabilities Can’t Be Outsourced

I wish I could take credit for the title of this blog, but it comes from a sentence recently written by Robert Lemos, Contributing Writer at DarkReading.com. In his article Mr. Lemos waxes poetic on how “Recent Breaches Spur New Thinking on Cloud Security.” This got me thinking about liability and how it seems everyone tries to delegate it away.

Post by Peter McCalister May 12, 2011
gold miner

Mining for Gold Through Data Analysis

Last week I blogged about how to realize the value of the gold mine of information in your compliance logs. I said you need a data analysis strategy and a strategy for how to engage the organization in using that data to uncover the misuse of privilege and potential for out of compliance scenarios. The human factor is important in designing any IT systems, but how does it apply here?

Post by Peter McCalister May 11, 2011
tablets-workplace

What Do You Think About the “In Configuration We Trust” Research Report?

Please use the Leave a Reply function below and send us your questions, comments, and thoughts regarding our research report “In Configuration We Trust.” – One person will be selected at random to win a new Amazon Kindle and $25 gift card. – Deadline to be entered into the contest is Friday 05/13/11 at noon PST….

Post by The eEye Research Team May 11, 2011
patch-tuesday

Microsoft Patch Tuesday – May 2011

Oh how I am starting to enjoy the odd numbered months this year. Back in January Microsoft released 2 bulletins. February followed with 12, March with 3, and April with 17. Now May has arrived with only 2 bulletins. If you are looking to avoid piles of patch deployment work this summer, I’d bet on…

Post by Chris Silva May 10, 2011