BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
guy tie

Top Threat To Cloud Computing

Posted September 26, 2011    Peter McCalister

It seems as if every business and IT executive that I talk to lately literally has their “head in the clouds.” Every conversation about current or impending strategies for information assets almost universally contains some mention of a public, private or hybrid cloud deployment. A more interesting observation of these conversations is that the lure of liberating ourselves from the burden of managing applications and data shouldn’t mean we stop having high expectations about how those applications and data are managed.

Categories:
Vulnerability Management
irene2

Some Identities Are Worth More Than Others

Posted September 23, 2011    Peter McCalister

We may be all created equal, but some identities are worth more than others. I’m not just talking about Mark Zuckerberg or Bill Gates being worth more than the average Mark or Bill working across the hall from you. It turns out that identity thieves target patient health information more than standard social security identities for good reason.

Categories:
General
microsoft

Internet Explorer MHTML Mime-Formatted Request Vulnerability

Disclosed September 23, 2011    Zeroday : 1035 days
Vendors: Microsoft
Vulnerability Severity: Medium
Exploit Impact: Information Disclosure
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
kindle

Sneak Peek: Free Mobility Scanning from eEye

Posted September 21, 2011    Brad Hibbert

With mobile devices and smart phones representing 40% of all mobile phones in the US, consumerization continues to blur the corporate boundary as employees expect and require consistent access to corporate services from wherever they are, on any device they’re using—desktops, laptops, tablets and smart phones. 

Categories:
General, Vulnerability Management
linux logo

Extending Password Policy To UNIX and Linux

Posted September 21, 2011    Peter McCalister

Our friends and colleagues at the Linux Foundation have been hit by a “brute force attack” and many of their sites have been taken down until the security breach is fully controlled.

Categories:
Security Research
villain trio

A Risk Worth Taking?

Posted September 20, 2011    Peter McCalister

It’s bad enough when an accidental insider threat compromises an organization’s security, but there’s something worse when it’s the result of a malicious past, or current employee, and according to the results of a recent survey, that’s something all employers should be worried about.

Categories:
Security Research
cisco

Cisco Identity Services Engine Database Default Credentials Vulnerability

Disclosed September 20, 2011    Fully Patched
Vendors: Cisco
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
Carl-resized-600

In Denial Over Insider Threats?

Posted September 19, 2011    Peter McCalister

Ever felt like if you could just ignore something, it would go away, disappear, self-correct? Guess what? The good news is you’re not alone. The bad news is that the company you’re keeping happens to be the majority of IT security professionals responsible for protecting corporate information assets.

Categories:
Security Research
apple

OS X Lion Fails to Verify Authentication Before Changing User Password

Disclosed September 18, 2011    Fully Patched
Vendors: Apple
Vulnerability Severity: Medium
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
apple

OS X Lion Fails to Protect Users’ Password Hashes

Disclosed September 18, 2011    Fully Patched
Vendors: Apple
Vulnerability Severity: Medium
Exploit Impact: Information Disclosure
Exploit Availability:
Categories:
Zeroday Tracker