BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

BeyondTrust on WikiLeaks and Corporate Security

Posted January 6, 2011    Peter McCalister

Earlier this month we were interviewed by Paul Rudo, chief blogger for

Categories:
General

2010: The Year of Insider Threats and Misuse of Privilege

Posted January 5, 2011    Peter McCalister

Increasingly difficult to thwart, attacks by people with legitimate access to an organization’s computers, devices and networks represent a growing problem across the globe.

Categories:
General

Trust But Verify: a Governance, Compliance & Risk Mandate

Posted January 4, 2011    Peter McCalister

At BeyondTrust, our name reflects what we believe our company and other companies should consider when evaluating security software products.

Categories:
General
microsoft

Microsoft Internet Explorer ReleaseInterface Remote Code Execution

Disclosed January 1, 2011    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
guy laptop

Data Breach Excuses and What They Really Mean: Excuse 5

Posted December 31, 2010    Peter McCalister

Excuse 5: APPOLOGIZE AND REASSURE CUSTOMERS IT WAS AN ACCIDENT RATHER THAN INTENTIONAL HARM. You guessed it, that’s what we hear next when data shows up stolen or vandalized. So this fifth installment of the Top 5 Excuses for Data Breaches and What They Really Meanwill attempt to translate this into what really happened and use current news to exemplify our point.

Categories:
Vulnerability Management
wireshark

Wireshark ENTTEC Dissector Buffer Overflow

Disclosed December 31, 2010    Fully Patched
Vendors: Wireshark Foundation
Vulnerability Severity: High
Exploit Impact:
Exploit Availability:
Categories:
Zeroday Tracker
Team

Data Breach Excuses and What They Really Mean: Excuse 4

Posted December 30, 2010    Peter McCalister

Excuse 4: DON’T MAKE AN EXCUSE, BLAME IT ON A THIRD PARTY. Yep, that’s what we hear next when data shows up stolen or vandalized. So this fourth installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Categories:
Vulnerability Management
hands

Data Breach Excuses and What They Really Mean: Excuse 3

Posted December 29, 2010    Peter McCalister

Excuse 3: SHUT THE DOOR AFTER THE HORSE HAS BOLTED. That is exactly what we hear next when data shows up stolen or vandalized. So this third installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Categories:
Vulnerability Management
guy tie

Data Breach Excuses and What They Really Mean: Excuse 2

Posted December 28, 2010    Peter McCalister

Excuse 2: SADLY, IT’S NOT POSSIBLE TO TRUST ALL PEOPLE ALL OF THE TIME. Yep, that’s what we hear next when data shows up stolen or vandalized. So this second installment of the Top 5 Excuses for Data Breaches and What They Really Mean will attempt to translate this into what really happened and use current news to exemplify our point.

Categories:
Vulnerability Management
Guy PC

Data Breach Excuses and What They Really Mean: Excuse 1

Posted December 27, 2010    Peter McCalister

Excuse 1: IT’S TOO SENSITIVE TO COMMENT FURTHER, FOR FEAR OF RISKING SECURITY FURTHER.

Categories:
Vulnerability Management