BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Windows Server 2008 R2 Recycle Bin

Posted November 26, 2011    Morgan Holm

Microsoft has included recovery capabilities with every release Active Directory (AD) from Windows Server 2000 on. There is a saying that has been around in IT for a long time, “An administrator is only as good as their last backup”. This is because accidental deletions of a single user object to the removal of hundreds…

Categories:
Privileged Account Management
Tags:
, , , , , , , ,
thxgiving

Don’t Be The IAM Turkey This Thanksgiving

Posted November 23, 2011    Peter McCalister

Most of the United States and Canada are preparing for the anual food fest known as Thanksgiving tomorrow to celebrate the bountiful harvest season. Or is it just an excuse for a work holiday in November? Either way, you can be sure that the potential for IT security breaches increase as vigilance wains for the holiday season.

Categories:
Vulnerability Management
villain trio

The Insider Threat Epidemic

Posted November 22, 2011    Peter McCalister

Insider threats, particularly unauthorized access by current and former employees, are still a growing concern for IT managers and network administrators, according to InformationWeek’s Insider Threat Reality Report. In the report, several internal issues were cited for network intrusions, including: lack of adequate security policies (17 percent); employee negligence (12 percent); unauthorized access by current…

Categories:
General
img

Big Data? Is There Any Bigger Data Than Your Security Data?

Posted November 22, 2011    Morey Haber

The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc. For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat and risk intelligence (assessments, compliance reports, attack…

Categories:
Vulnerability Management
Tags:
no excuses

You Will Know It When You See It

Posted November 21, 2011    Peter McCalister

One of most talked about topics at the just completed Gartner Identity and Access Management Summit in San Diego was advanced persistent threats. While it may be hard to define, and I will leave that to the experts at Gartner, based on the level of discussion at the event and all the available data this is a topic you will get to know in the near future.

Categories:
Vulnerability Management
austinlogo[1]

Austin Powder uses PowerBroker to Implement Least Privilege

Posted November 18, 2011    Peter McCalister

Austin Powder, a manufacturing firm based in Ohio, faced an interesting challenge of taking their company to a least privilege model. They also needed to reduce malware threats within the organization. At the start of the project, the company knew little about the least privilege model. They began to develop an in-house solution, a wrapped…

Categories:
Privileged Account Management
cloudlock-1

In The Cloud You Don’t Want To Be Sudo Wrestling!

Posted November 17, 2011    Peter McCalister

In a recent discussion with several customers we asked a questions, “How many of you are deploying clouds?”, everyone raised their hand. Then we asked similar questions about public and private clouds. Everyone still raised their hand. Many companies are implementing new infrastructure that includes both private and public cloud. This is often referred to…

Categories:
Vulnerability Management
BTR cvr

Born To Run…and Can Your Cloud Escape Injury?

Posted November 16, 2011    Peter McCalister

There’s a lot of hype in the running community over the 2009 book by Christopher McDougal, “Born To Run.” It has inspired a host of people–experienced runners and average Joes–to switch to barefoot running, where people where either nothing on their feet at all or some sort of minimalist shoe. The most headturning of these minimalist shoes have to be the Vibram Five Fingers shoes. You’ve seen them–they look like gloves for feet.

Categories:
Vulnerability Management
zero-gap1

On False Senses of Security

Posted November 16, 2011    Mike Puterbaugh

Customer conversations are the best part of my job. I really enjoy talking with users and buyers of security technology, especially in today’s hyperactive threat and attack climate. Most often these conversations are with customers proactively planning updates to their security strategy, or with prospects that have matured to a level where their tools need to be upgraded to enterprise solutions. However, there is small percentage of organizations we speak with who have come to eEye as a result of breach or a failed audit. One of *those* conversations was the impetus for this post.

Categories:
Privileged Account Management
Tags:
annie

Size Doesn’t Matter When it Comes to Insider Threats

Posted November 15, 2011    Peter McCalister

Rogue employees can be found at Fortune 500 companies down to small businesses with less than ten employees. If there is one thing we know, insider threats don’t discriminate based on size. Many small businesses unfortunately suffer from the “it won’t happen to me” denial syndrome. Yet according to the Association of Certified Fraud Examiners Report to the Nation, the median loss suffered by organizations with fewer than 100 employees was $200,000.

Categories:
General