Hi, my name is Bob, I’m an IT Director at a mid-sized financial company and it’s been 11 months since my last insider attack…that I know of. (All together now) HI BOB!
Every organization wants to know where they are going and where they have been. Performing an analysis on the here and now only gives a snapshot that gives little perspective into how things have progressed or patterns for the future. For vulnerability assessment, many clients rely on delta reports to compare scan jobs and data…
As a longtime Blackberry user I have been looking forward to the release of the Blackberry Playbook. With many of my colleagues using tablets, particularly iPads, I have been getting a little jealous of what they could do. So in addition to the excitement about RIM setting a release date I also noted the excitement about the announcement that the Playbook will support Android Apps.
What happens when a top security company fails to implement a least privilege solution? Just look at what was reported about RSA to see what awaits you if you fail to implement a least privilege solution and someone hijacks credentials to steal information via Advanced Persistent Threat. Yep, the cobbler’s son does have NO SHOES.
Virtualization offers a wide array of benefits from power and environmental constraints to physical space limitations and disaster recovery efforts. As leaders for Unified Vulnerability Management, we realize these benefits offer a significant value to our install base and we are in full support of virtualization for our solutions. Although virtualization is in many ways…
If you haven’t read by now, at this year’s Pwn2Own hacker challenge that took place at CanSecWest in Vancouver last week, the iPhone and Blackberry were both hacked. Teams also demonstrated several vulnerabilities in browsers, macbooks and more.
Eliminating local admin rights from Microsoft Windows users is not just a nice thing you should do, but in fact a mandatory best practice for all of today’s enterprises wishing to stay secure and compliant.
You may have thought that misuse of privilege is a victim less crime and no one will care. Just ask former Goldman Sachs programmer, Sergey Aleynikov what he is doing for the next 8 years and then decide for yourself.
Here at BeyondTrust, we work with some of the most sensitive information in the world. The kind of stuff that makes or breaks businesses, collapses empires, or creates headlines. Ok – we’re being melodramatic, and we also deal with things as simple as system configuration settings that hike up help desk costs.
The Security Content Automation Protocol (SCAP, pronounced S-cap) is a suite of open standards that when referenced together, deliver an automated vulnerability management, measurement, and policy compliance evaluation for network assets. The first version of the suite specification focused on standardizing communication of endpoint related data and to provide a standardized approach to maintaining the…