This week I had an interesting exchange with a full-time Linux administrator. What started out as a discussion about PowerBroker Servers Linux Edition, quickly became a heated debate about trust. After much back and forth, he said this: “At the end of the day, employers need to trust the employees. Relying on technological solutions to ‘keep honest people honest’ is putting the cart before the horse. If you can’t trust your employees, you shouldn’t have hired them.”
How many of you remember the Nicholas Cage character, Memphis Raines in the action movie Gone in 60 Seconds? If you do, bravo for being an action movie buff… for those of you not “in the know” he was a (fictional) car thief who had to steal 50 high end cars in just one night.
Recently we hosted a webinar with VMware, “Close Your Virtual App Security Gap”. If you haven’t had a chance to check out the materials from that webcast, you can find the slides here. It was a great session, where the eEye and VMware ThinApp product teams talked about virtual app security and how virtual apps can…
Two weeks ago a new book called “Preventing Good People From Doing Bad Things” was published by Apress Media, and I even published the top 10 reasons to buy the book last week in this blog, but why take my word for it when you can look to those independent reviewers for unbiased insight?. Bob…
Virtual apps, and specifically those deployed by market leading VMware’s ThinApp technology, are becoming increasingly popular in the financial services and healthcare-related fields, as well as with government agencies. Why? The technology allows IT teams easily streamline application mobility and eliminate application conflicts on the desktop, which at the end of the day, means…
As we discussed several times, enterprise IT security isn’t easy. As recent article at Dark Reading makes clear, part of the reason is that even the smallest flaw can lead to a major security breach.
Most companies fear the cost of data breaches more than anything, while others fear the embarassing negative publicity wich can have even great negative impact on their organization when misuse of privilege makes the national news.
|Vendors:||Apache Software Foundation
|Exploit Impact:||Elevation of Privilege
In early September BeyondTrust CMO Brian Anderson covered the news around Stanford Hospital & Clinics medical privacy breach that resulted in 20,000 patients’ personal data being publicly available on a website for nearly a year. At the time the breach was first reported by The New York Times, it was unclear how the data made it onto the website.