BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
maiffret_cnn-680x375

It Takes More Than a Decoder Ring

Posted December 6, 2011    Marc Maiffret

This week I was invited to lend my “expert thoughts” on a recent news piece on a UK intelligence agency which has opened up their hiring practices to include an online code cracking competition.  The team over at CNN’s Situation Room thought this was an interesting concept and invited me in for a quick discussion….

Categories:
General
Tags:
, , ,
annie

You And I: The Not So Obvious Insider Threat

Posted December 6, 2011    Peter McCalister

Remember the scene in Jerry Maguire where he has returned to his office to collect his stuff, after learning he has been let go, and he has a bit of a freak-out on the way out the door, grabbing the goldfish and making bold claims about the company he is going to build that will…

Categories:
Privileged Account Management
adobe

Adobe Reader/Acrobat U3D Memory Corruption Vulnerability

Disclosed December 6, 2011    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
dave2

Black Market For Server Data Is Prevelant And Profitable

Posted December 5, 2011    Peter McCalister

The economy of cyber-crime is all too real—and too enticing. No longer sequestered to dark alleys and seedy bars, data thieves have almost unlimited options to market their ill-gotten wares to potential buyers. What this means to employers and organizations: the temptation to access and “appropriate” sensitive data may be too great for some to resist.

Categories:
Privileged Account Management
virus

The Confluence Of Influenza, 0Day Viruses and Least Privilege

Posted December 2, 2011    Peter McCalister

What does influenza, 0day viruses and least privilege have in common you may ask? Besides just being a cool title to get you to read this blog, it turns out that natural mutations, the fear of the unknown and reducing attack surfaces is the short answer. The long answer is best understood by first reading…

Categories:
Privileged Account Management
old school

What’s New With IAM?

Posted December 1, 2011    Peter McCalister

What’s New? Well according to some of the participants at the Gartner Identify and Access Management Summit in San Diego, not much.

Categories:
Vulnerability Management
least privilege architecture

Least Privilege Windows Architecturally Speaking

Posted November 30, 2011    Peter McCalister

We’ve talked about least privilege throughout thisblog over the past two years at length, but why should a desktop user care? Ultimately, a user needs admin rights on the desktop to

Categories:
Privileged Account Management
mandm-1

M&M Security Bound To Be Eaten Without Least Privilege

Posted November 28, 2011    Peter McCalister

No, I’m not talking about the Mars candy, funny characters pervasive on your TV, or even the legendary brown ones from a Van Halen concert rider.

Categories:
Privileged Account Management

Windows Server 2008 R2 Recycle Bin

Posted November 26, 2011    Morgan Holm

Microsoft has included recovery capabilities with every release Active Directory (AD) from Windows Server 2000 on. There is a saying that has been around in IT for a long time, “An administrator is only as good as their last backup”. This is because accidental deletions of a single user object to the removal of hundreds…

Categories:
Privileged Account Management
Tags:
, , , , , , ,
thxgiving

Don’t Be The IAM Turkey This Thanksgiving

Posted November 23, 2011    Peter McCalister

Most of the United States and Canada are preparing for the anual food fest known as Thanksgiving tomorrow to celebrate the bountiful harvest season. Or is it just an excuse for a work holiday in November? Either way, you can be sure that the potential for IT security breaches increase as vigilance wains for the holiday season.

Categories:
Vulnerability Management