BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

2010 Year in Review by CEO Kevin Hickey

Posted December 7, 2010    Kevin Hickey

Kevin Hickey, CEO of eEye Digital Security, addresses customers, partners, and prospects with a year-end review of 2010. First, he announces the launch of the new Retina CS 2.0 solution and covers what eEye promised at the beginning of the year and what they delivered, then introduces you to where the company is headed in…

Categories:
General
Tags:
, , ,
gold-bar

How Much is Goldman’s Code Worth?

Posted December 6, 2010    Peter McCalister

The trial of a former Goldman Sachs programmer accused of stealing source code to take to a competitor has begun in somewhat of a public spectacle. The Wall Street Journal unveiled some particularly interesting details. For example, the programmer was one of the highest paid in the company with a $400,000 annual salary, but competitor Teza Technologies offered him over $1 million in total pay including a $700,000 bonus.

Categories:
General
broken chain

WikiLeaks Debacle Points to Least Privilege Weakest Link

Posted December 3, 2010    Peter McCalister

We’re used to the media getting side tracked by the content of data breach stories, rather than how they happened, as other posts here have regularly noted.

Categories:
Privileged Account Management
guy laptop

Calculating Your ROI For Least Privilege

Posted December 2, 2010    Peter McCalister

So you’ve decided to implement a privilege identity management solution because you’ve realized that a least privilege environment is a perfect way to eliminate the misuse of privilege from your corporation, help satisfy ever changing governance mandates and deliver on-demand reporting entitlement reports and keystroke logs to auditors when required.

Categories:
Privileged Account Management
Break in

Privilege Identity Management Ensures Governance Mandates

Posted December 1, 2010    Peter McCalister

Corporate governance ensures accountability across the extended enterprise. It facilitates staying competitive and satisfying ever changing government regulations while providing mechanisms and controls to reduce the inefficiencies that arise when individuals misuse privileges granted to them.

Categories:
Vulnerability Management
hands

Top 10 Reasons To Use Licensed Software Vs Freeware

Posted November 30, 2010    Peter McCalister

In the spirit of keeping blog posts informative, short and fun, this one takes a cue from David Letterman in format. So without further fanfare or wasted space… the Top 10 Reasons To Use Licensed Software Vs Freeware are:

Categories:
Vulnerability Management
Guy PC

More Collaboration Needed For IT Governance and Compliance

Posted November 29, 2010    Peter McCalister

In a new survey conducted by Unisphere Research, results showed that even as many Database Administrators (DBAs) are willing to assume much needed security practices in their daily duties, there is an overwhelming communication disconnect between these data managers and the security and executive leadership responsible for the data security at the end of the day.

Categories:
General
microsoft

Internet Explorer CSS Import Rule Use-After-Free

Disclosed November 29, 2010    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
ipad pic

Mobile Workers Require Setting Boundaries vs Building Walls

Posted November 24, 2010    Peter McCalister

Although corporate networks today are increasingly open to subcontractors, partners or affiliates, or simply a workforce on the move, the tendency is still to think of security in the same way castles were defended in the middle ages, by building bigger walls – higher, wider and with more built in obstacles.

Categories:
General
microsoft

Microsoft Windows RtlQueryRegistryValues Local Privilege Escalation

Disclosed November 24, 2010    Fully Patched
Vendors: Microsoft
Vulnerability Severity: Medium
Exploit Impact: Elevation of Privilege
Exploit Availability:
Categories:
Zeroday Tracker