BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Penetration Tools (Updated)

Posted May 3, 2010    Morey Haber

The post I had here earlier was worded in a way that was misleading, and I want to rewrite it now so that I’m perfectly clear.

Thousands of legitimate individuals and businesses (including eEye) perform penetration testing, which is useful, required by regulatory compliance, and a very important tool in the security industry. Referring to it as anything besides a tool is a poor choice of language, and I want to correct it. My main issue is with running penetration testing tools against assets that the user either does not own or is not responsible for. And, the easy availability of such tools, often free of charge, opens the door for this potential abuse. On the contrary, it also makes it easier for businesses to test themselves whether a vulnerability can be exploited. This is a difficult balance.

With many years in this business, I’m well acquainted with what can go wrong, and what I hoped to convey was the importance of well-managed testing under the watch of a user who knows what they’re doing. When these tools aren’t used as they are intended to be, with care and professionalism, damage can be done. Having them free, and readily available for everyone increases the risk of the wrong person, using the right tools, in the wrong way.

Additional articles

medicalbreach

The Magnitude of Cybersecurity Problems in United States Healthcare

Posted April 30, 2015    Dr. Mansur Hasib

Dr. Mansur Hasib discusses healthcare compliance and why healthcare records are far more valuable to the modern cyber criminal than any other data.

Tags:
, , ,
windows-10-logo-featured

What BeyondTrust Has to Say about Windows 10

Posted April 28, 2015    Morey Haber

Microsoft is on the verge of releasing its latest operating system, Windows 10. It has taken several nontraditional strides and also included some key components that we’re keeping our eyes on. Read on to learn what BeyondTrust has to say about Windows 10.

Tags:
, , ,
pbps-blog2

10 Ways to Ensure Your Privileged Password Management Strategy Will Succeed

Posted April 27, 2015    Scott Lang

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organisation. But if passwords are such a no-brainer, why do so many data breaches tie back to poor password management?

Tags:
, , , , , , , ,