BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
president

Government Tech Leaders Carefully Embracing the Cloud

Posted December 9, 2011    Peter McCalister

What organizations have the biggest data security needs of all? Financial institutions? Technology companies with highly-sensitive proprietary code? Depending on who you ask, you’ll get a variety of answers. One type of insititution, however, seems to trump them all: Government. A recent blog post titled Cloud Security: Better Than We Think? on Information Week takes…

Categories:
General
restricted groups 2

Removing Users From The Local Administrators Group

Posted December 8, 2011    Peter McCalister

When embarking on a project to remove administrator rights from users, it is important to understand all of the options available for modifying local group membership on your clients. If you have hundreds or even thousands of desktops, it is not feasible to do this manually. Fortunately, Microsoft provides two mechanisms in Group Policy to…

Categories:
General
blowfish-98x98

Honey, Does this Installer Make Me Look Fat?

Posted December 7, 2011    The eEye Research Team

I remember the days when I used download.com to grab utilities and shareware, never really questioning why I used download.com. All I knew is that it was safe and fast, usually appearing as a top search result in Google and it was always available. Unfortunately, CBS Interactive found that it would be monetarily advantageous to bundle downloads in…

Categories:
Vulnerability Management
Tags:
, ,
needle

Looking For A Needle In A Haystack Without Least Privilege

Posted December 7, 2011    Peter McCalister

Ever use the phrase that looking for something was like “finding a needle in a haystack”? If you’ve ever seen (or especially played in) a haystack then you understand the magnitude of that challenge. This also applies to IT security when trying to uncover who or what was able to access confidential information and either steal, damage or delete it altogether.

Categories:
Privileged Account Management
maiffret_cnn-680x375

It Takes More Than a Decoder Ring

Posted December 6, 2011    Marc Maiffret

This week I was invited to lend my “expert thoughts” on a recent news piece on a UK intelligence agency which has opened up their hiring practices to include an online code cracking competition.  The team over at CNN’s Situation Room thought this was an interesting concept and invited me in for a quick discussion….

Categories:
General
Tags:
, , ,
annie

You And I: The Not So Obvious Insider Threat

Posted December 6, 2011    Peter McCalister

Remember the scene in Jerry Maguire where he has returned to his office to collect his stuff, after learning he has been let go, and he has a bit of a freak-out on the way out the door, grabbing the goldfish and making bold claims about the company he is going to build that will…

Categories:
Privileged Account Management
adobe

Adobe Reader/Acrobat U3D Memory Corruption Vulnerability

Disclosed December 6, 2011    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
dave2

Black Market For Server Data Is Prevelant And Profitable

Posted December 5, 2011    Peter McCalister

The economy of cyber-crime is all too real—and too enticing. No longer sequestered to dark alleys and seedy bars, data thieves have almost unlimited options to market their ill-gotten wares to potential buyers. What this means to employers and organizations: the temptation to access and “appropriate” sensitive data may be too great for some to resist.

Categories:
Privileged Account Management
virus

The Confluence Of Influenza, 0Day Viruses and Least Privilege

Posted December 2, 2011    Peter McCalister

What does influenza, 0day viruses and least privilege have in common you may ask? Besides just being a cool title to get you to read this blog, it turns out that natural mutations, the fear of the unknown and reducing attack surfaces is the short answer. The long answer is best understood by first reading…

Categories:
Privileged Account Management
old school

What’s New With IAM?

Posted December 1, 2011    Peter McCalister

What’s New? Well according to some of the participants at the Gartner Identify and Access Management Summit in San Diego, not much.

Categories:
Vulnerability Management