BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
guy laptop

Reasons Why You Should Give a DAM: Part 2

Posted June 24, 2011    Peter McCalister

Continuing the thread started in a previous blog titled Reasons Why You Should Give a DAM: Part 1, today’s blog will focus on what can be done and the value you should achieve.

Categories:
Privileged Account Management
cloud

The Special Case of Privileged Users in the Cloud

Posted June 23, 2011    Peter McCalister

As we have been discussing the last few weeks, if you want to use the cloud and need to do it in a secure and compliant way, it’s a matter of shared responsibility. If you want your cloud vendors to be secure enough to protect your corporation’s most sensitive data, then you have to insist on it, communicate your requirements and oversee the controls. That leaves the final piece of the cloud security puzzle – the special case of the privileged users in the cloud.

Categories:
Vulnerability Management
cloud-security-img

Unified Vulnerability Management – From The Cloud to Agents

Posted June 23, 2011    Morey Haber

I have written a few articles regarding comments from analysts and found a recent one that needs more visibility. In a recent paper, the analyst stated that any enterprise vulnerability assessment deployment should have at least 2 of 3 following technologies deployed for full coverage while performing a vulnerability assessment: Network Based Vulnerability Assessment Scanner…

Categories:
Vulnerability Management
ID Keys

PowerBroker Servers Protects Root Password

Posted June 22, 2011    Peter McCalister

An IT outsourcing company (responsible for integrating the IT systems for one of the world’s largest manufacturing companies) was tasked with managing its clients’ critical SAP/Oracle-based environment. The company committed to creating and maintaining a controlled and secure environment for the client, however this endeavor was wrought with challenges. In order for the goal to…

Categories:
Vulnerability Management
bigdata-98x98

Plugging Into Your Remediation Process

Posted June 21, 2011    Morey Haber

My team and I have spoken with a number of analysts and have confirmed that the plethora of vulnerability assessment solutions on the market share a common trait and a common flaw, the shear volume of reports that can be created based on a vulnerability assessment. Every scan can lead to a myriad of hosts…

Categories:
Vulnerability Management
Intentional Harm

Reasons Why You Should Give a DAM: Part 1

Posted June 21, 2011    Peter McCalister

The lack of control of privileged database credentials continues to expose corporations to significant risk associated with insecurity and inaccuracy of the key data assets that drive business activities, decisions, and value. I’ve previously covered the six questions you should ask yourself if you should give a DAM, so now it’s time to look a little deeper at the implications.

Categories:
Vulnerability Management
pledge-resized-600.jpg

Sensitive Data Security – Our Pledge to Your Customers

Posted June 20, 2011    Peter McCalister

In the wake of the recent attack on the Sony PlayStation Network and the resulting massive data breach, consumers are more than a little concerned about the security of the sensitive information that they provide companies. For the most part, many of them know very little about the online security measures in place at companies with whom they do business. And until recently, they probably didn’t care.

Categories:
Vulnerability Management
Lockdown

Macs Need Least Privilege Too

Posted June 17, 2011    Peter McCalister

Turns out that Macs aren’t as virus and hacker proof as originally perceived. Just check out a recent posting on MacRumors.com to read all the details. In this blog post it appears that a new malware threat is appearing when users perform Google searches. I’ve actually seen this malware pop up on a Mac recently,…

Categories:
Privileged Account Management
cloud

Cloud Vendors Need Least Privilege For Better Security

Posted June 16, 2011    Peter McCalister

If you want to use the cloud and need to do it in a secure and compliant way you’re going to need to think about who’s responsible for what. As numerous studies and articles have highlighted, most cloud vendors today don’t provide a platform that’s fully up to enterprise security standards.

Categories:
Privileged Account Management
psst wanna buy-resized-600.gif

Pssst – Hey Buddy, Wanna Buy Some Data?

Posted June 15, 2011    Peter McCalister

The economy of cyber crime is all too real – and too enticing. No longer sequestered to dark alleys and seedy bars, data thieves have almost unlimited options to market their ill-gotten wares to potential buyers. What this means to employers and organizations: The temptation to access and ‘appropriate’ sensitive data may be too great for some to resist.

Categories:
Vulnerability Management