BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
patch-tuesday

Microsoft Patch Tuesday – September 2011

Posted September 14, 2011    Chris Silva

Quite unsurprisingly (as they accidentally leaked them last Friday), Microsoft released 5 security bulletins today. This month is fairly moderate, with none of the bulletins rating a critical rating.

Categories:
Vulnerability Management
dave2

Insider Threats Exist in Virtualized Environments Too!

Posted September 13, 2011    Peter McCalister

Disgruntled Dave is at it again! What happens when a disgruntled IT administrator deletes the contents of 15 virtual hosts (roughly equivalent to 88 different computer servers)? According to a recent eWeek article highlighting the incident – quite a bit! For the Japanese pharmaceutical company, the attack was so damaging that it froze operations for “a number of days, leaving employees unable to ship products, to cut checks or even communicate via email,” according to court documents. Estimated damages cost the company $800,000. For the disgruntled employee, he’s looking at the possibility of serving 10 years in prison when he is sentenced in November.

Categories:
Security Research
azeotech

AzeoTech DAQFactory Stack Overflow

Disclosed September 13, 2011    Fully Patched
Vendors: AzeoTech, Inc.
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
types-of-bone-fractures

An Ounce of Least Privilege Is Worth A Pound Of Compliance

Posted September 9, 2011    Peter McCalister

If an ounce of prevention is worth a pound of cure then an ounce of least privilege is worth a pound of compliance for your extended enterprise.

Categories:
Privileged Account Management
pbwd rules

How To Leverage MS SharePoint for UVM Reports

Posted September 8, 2011    Morey Haber

One of the most important facets regarding security is escalating data to the proper individuals in a timely manner. This is generally done using reports or some form of email alerts. In the context of reports, securing and proper distribution of the contents is just as important as the data contained within. In other words,…

Categories:
Privileged Account Management
pizza

Large Pepperoni Pizza With A Side Of Least Privilege

Posted September 7, 2011    Peter McCalister

One of America’s favorite food is pizza and for the household where both parents work, it’s also a favored “take out” salvation for the family dinner. Correspondingly, the average neighborhood pizza parlor can become a prime target for identity and credit card theft.

Categories:
Privileged Account Management
cloudlock1

Stuxnet? Night Drag0n? Nope,You Got Pwned by a Printer.

Posted September 6, 2011    Mike Puterbaugh

At the recent BlackHat and DefCon conferences, our annual eEye Research Team T-shirt was one of the more memorable ones we’d done in a while (and if you remember 2005, that’s saying something). In keeping with the theme of Security in Context, the shirt parodied the fear that attacks like Stuxnet, NightDragon and Operation Aurora had…

Categories:
Privileged Account Management
Tags:
irene2

The New Twist On Insider Threats

Posted September 6, 2011    Peter McCalister

Just when an insider breach couldn’t be any worse for all parties involved – the data has been compromised, customers are upset, the company is embarrassed, it’s a lose-lose for everyone – the Financial Industry Regulatory Authority (FINRA) steps in with a new twist. A fine.

Categories:
Vulnerability Management
Accidental Harm

Top 10 Reasons To Bridge UNIX, Linux And Mac To Active Directory

Posted September 2, 2011    Peter McCalister

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… as David Letterman would say, “Here’s today’s top ten”… zingers related to securing your Linux, Unix, and Mac systems with Active Directory. Funny on a blog but not very funny if they happen in your IT environment!

Categories:
General
apple

Apple Mac OS X Keychain Certificate Security Bypass

Disclosed September 2, 2011    Fully Patched
Vendors: Apple
Vulnerability Severity: Medium
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker