BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
hands

And The Data Breaches Just Keep On Coming…

Posted February 7, 2012    Peter McCalister

Recently two new data breaches were announced, one the result of an accidental misuse of privilege and the other the result of negligence by a third party vendor. First, the Department of Veterans Affairs announced it accidentally handed over the data of living veterans when complying with a Freedom of Information request from Ancestry.com. The…

Categories:
General
villain trio

Who is To Blame When An Insider Breach Occurs?

Posted February 6, 2012    Peter McCalister

As I’ve waded through the hundreds of published insider breaches from just the last two years, what was a clear recurring theme was that of the vagaries of human nature. Not meaning to wax poetic, but it was always an individual who misused their own, or some other insider’s, privileged access authorizations to IT systems…

Categories:
General
Accidental Harm

But Users Aren’t That Savvy….NOT!

Posted February 2, 2012    Peter McCalister

BeyondTrust has been doing Privilege Management for over 25 years. I’ve been with the company for over six of them. I’m constantly talking with people about the benefits of running their enterprise users as standard users, rather than administrative ones. Admin users are able to circumvent Group Policy or other security measures, such as installing…

Categories:
General
scmag1-98x98

Industry Experts Call Retina CS a ‘Flawless’ Best Buy

Posted February 1, 2012    Mike Puterbaugh

Yesterday Morey Haber gave our readers a sneak peek at what was to come with our soon-to-be-announced Retina CS 3.0 release. All of us here at eEye feel 3.0 will drive even greater distance between eEye and our competitors. Customers speak the loudest with regards to my backing up our claim of market and product…

Categories:
General
Tags:
, , ,
guy tie

Database Security Risks Run Amok Without Oversight

Posted February 1, 2012    Peter McCalister

As you can imagine, databases are in a class of data storage, organization, and management unto themselves. As such, the inherent security vulnerabilities in which a least privilege solution can help mitigate are also relatively unique. I’ve uncovered six that should be explored: Misconfigurations: Database schemas can be very temperamental and any misconfiguration error can…

Categories:
General
Tags:
blindspot-250x165

Driving Security with Blind Spots

Posted January 31, 2012    Morey Haber

For those of us who commute in Southern California, driving isn’t as always as cut and dry as it is in other locations.  For example: say you’re driving down the highway at 70 mph and you realize at the last minute you need to exit 3 lanes over. Obviously you know this requires more than…

Categories:
General
Tags:
, , ,
Intentional Harm

Layoffs May Lead to Insider Attacks

Posted January 31, 2012    Peter McCalister

Employee terminations are, unfortunately, a necessary evil for corporations. In a time of recession, layoffs are more copious and often leave those affected angry and upset. It should come as no surprise that a small minority of those cases has led to disastrous consequences for former employers because of some terminated employee backlash. Just recently,…

Categories:
General
zappos

Just One Open Server Is Enough For Misuse Of Privilege

Posted January 30, 2012    Peter McCalister

Gambling on the odds may be fine for a weekend in Las Vegas, but do you really want to take that same risk with your precious corporate information assets? Zappos learned the hard way what happens when even one server is at risk from a security perspective. A recent Dark Reading articled entitled “Zappos Dealing…

Categories:
General
charliesheen-winning

January VEF winner announced. Takes home an Amazon Kindle Fire.

Posted January 26, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Categories:
Security Research
Tags:
, , ,
Bill

I’m Too Busy To Worry About It

Posted January 26, 2012    Peter McCalister

You ever say this to yourself? Sure, we all have at one point or another; and that’s understandable. Between the stress we sometimes feel at work and home, it’s easy to throw your hands up and think, this is just the way it is, these are the problems I have to deal with. But think…

Categories:
General