BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
dunk

Slam Dunk

Posted October 20, 2011    Peter McCalister

There aren’t many things in enterprise IT security that are easy enough to do to be called a slam dunk, but I may have one for you. A recent study of IT managers and network administrators conducted by Amplitude Research on behalf of VanDyke Software, shows a growing concern about insider threats, particularly unauthorized access by current and former employees.

Categories:
Security Research
thumb_default

Another First to Market by eEye: Vulnerability Management for Virtual Apps

Posted October 20, 2011    Brad Hibbert

More and more organizations are implementing virtualized solutions to reduce cost and gain strategic flexibility. As such, eEye continues to enhance Retina’s virtualized scanning capabilities to provide insight over the risks these assets raise for the business.

Categories:
Vulnerability Management
book

Top 10 Reasons To Buy New Least Privilege Book

Posted October 19, 2011    Peter McCalister

While you work hard to keep the bad guys out, a trusted employee, contractor or partner, can cause more damage than any outside hacker could ever do. This book will help you prevent this nightmare scenario by showing you how “less is more” when it comes to protecting your network and information assets.

Categories:
General
cybersecurity1-resized-600.jpg

Time Is Of The Essence When Implementing Security Best Practices

Posted October 18, 2011    Peter McCalister

Six years ago the U.S. Government Accountability Office (GAO) criticized the IRS for lax security practices. Now it would seem that six years is plenty of time to get the right security policies in place, but while the IRS is showing progress, it has yet to remediate 65 of the 88 previously reported weaknesses – and now the most recent GAO audit has turned up 37 new weaknesses to add to the list. This news affects every tax-paying citizen in the U.S., as all of our information is at risk, and it’s a good example of why every organization needs to be paying attention to their own security policies.

Categories:
Security Research
skype

Skype Multiple 0day Vulnerabilities

Disclosed October 18, 2011    Zeroday : 1066 days
Vendors: Skype Limited
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
president

President Obama Endorses Least Privilege

Posted October 17, 2011    Peter McCalister

We have showed that the insider threat is significant in this blog for the last 2 years and have even pointed out recently that it made the Wall St Journal among other well respected publications. But, when President Obama aims to stop WikiLeaks-style disclosures, then least privilege has really come of age.

Categories:
Privileged Account Management
img-64

Samsung Mobile Devices Vulnerable to Website Wipe

Posted October 16, 2011    Peter McCalister

According to IBTimes, Samsung, one of the leaders in manufacturing Android devices, has a very serious bug in their TouchWiz implementation of Android. Samsung, like most manufacturers, modifies the stock Android image to add in its own modifications and enhancements.

Categories:
General
Tags:
, , ,
terminator

Terminator V: Utilities Under Fire Without Least Privilege

Posted October 14, 2011    Peter McCalister

Remember the premise of Terminator and about another 100 or so Hollywood movies that have computers taking over the world? The first step in this conquest is always that we rely heavily on machines being connected to the worldwide web to make our life easier. This becomes problematic when said equipment is managing critical infrastructure like say electricity, water, communications, etc. Wait isn’t that what we’ve now done?

Categories:
Privileged Account Management
microsoft

Duqu – Vulnerability in TrueType Font Parsing Elevation of Privilege

Disclosed October 14, 2011    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
guy laptop

Protecting Yourself and Satisfying Auditors With Least Privilege

Posted October 13, 2011    Peter McCalister

Within the complex world of IT infrastructure exists a vitally important group of people: those charged with administering a company’s most critical assets and protecting its most sensitive data. They are known as privileged users, and by definition they possess a collection of access rights reserved only for those a company has entrusted with significant responsibility in safeguarding not just data, but also brand reputation, customer trust, and sustained revenue.

Categories:
Privileged Account Management