BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Team

Data Breach Excuses and What They Really Mean: Excuse 4

Excuse 4: DON’T MAKE AN EXCUSE, BLAME IT ON A THIRD PARTY. Yep, that’s what we hear next when data shows up stolen or vandalized. So this fourth installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Post by Peter McCalister December 30, 2010
hands

Data Breach Excuses and What They Really Mean: Excuse 3

Excuse 3: SHUT THE DOOR AFTER THE HORSE HAS BOLTED. That is exactly what we hear next when data shows up stolen or vandalized. So this third installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Post by Peter McCalister December 29, 2010
guy tie

Data Breach Excuses and What They Really Mean: Excuse 2

Excuse 2: SADLY, IT’S NOT POSSIBLE TO TRUST ALL PEOPLE ALL OF THE TIME. Yep, that’s what we hear next when data shows up stolen or vandalized. So this second installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Post by Peter McCalister December 28, 2010
Guy PC

Data Breach Excuses and What They Really Mean: Excuse 1

Excuse 1: IT’S TOO SENSITIVE TO COMMENT FURTHER, FOR FEAR OF RISKING SECURITY FURTHER.

Post by Peter McCalister December 27, 2010
BT_2011

Happy Holidays from BeyondTrust

BeyondTrust wishes you a safe and happy holiday season, as well as a new year filled with privilege identity management and least privilege for all!  Don’t forget to ask your BeyondTrust sales rep for any end-of-year specials to help get that least privilege solution in before the US no longer provides Section 179 tax bennefits.

Post by Peter McCalister December 23, 2010
Win 7

Least Privilege and Windows 7 Compatibility

In planning the move to Windows 7, Application Compatibility should be a top priority. The key technology that Microsoft provides for this is the Application Compatibility Toolkit (ACT). Now in version 5.5, ACT has been around for some time, and it is designed to help identify and mitigate potential issues with application portfolios. ACT works by taking an inventory of your existing applications and analyzing them to determine if they will be compatible with Windows 7. Once the applications have been analyzed, there are a few different approaches for mitigation. One is to use the ACT shims to get the applications to run. Another option is to utilize Windows XP Mode on Windows 7. This should make the transition to Windows 7 much easier for most organizations, as well as prevent downtime for your end users.

Post by Peter McCalister December 22, 2010
PBIS-resized-600

Network Devices Need Least Privilege Too

Any security infrastructure at an organization is only effective as its weakest link. All too often, the weakest link in today’s enterprise networks are the non-production servers and network devices not deemed mission critical. Eliminating shared passwords and logging activities down to the keystroke level on SSH-based network devices is a critical success factor for eliminating that security “weakest link”.

Post by Peter McCalister December 21, 2010
swiss cheese

The Swiss Cheese Model

We’ve heard a lot of stories from administrators on how they tried implementing a least privileged model without a solution like PowerBroker Desktops.

Post by Peter McCalister December 20, 2010
hands

3 Steps to Good Governance with Privilege Identity Management

“keep on trying until you are successful” is so much easier to read then this last offering for t-shirt slogan week. And very apropros to the theme of corporate governance. I also want to thank ThinkGeek.com for the inspiration for this week’s blog themes.

Post by Peter McCalister December 17, 2010
sticky

The Value of a Dashboard

I have been intrigued by the number of different paradigms used to make up an enterprise solution management console dashboard. Some are more tabular in nature like a SIM and others graphical with little text and fully animated with icons and avatars. When I first started working with enterprise solutions in the mid 1990’s, I…

Post by Morey Haber December 16, 2010
Tags:
, , , ,