Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Security is a Team Sport

Posted November 2, 2010    Peter McCalister

In organizations that aren’t sophisticated with measuring the value of risk, getting budget for security can be a tough gig. SC Magazine has an entire blog dedicated to an active running list of publicly known breaches, yet no matter how many examples you show, sometimes the logic that it will never be you is just a wishful thinking phenomenon that can’t be beat.

This is especially problematic when we talk about the risks of an accident, which requires systematic oversight to avoid. It would beSecurity is a team sport so much cheaper and easier to just not make mistakes, right? So just don’t screw up!

That must have been what the National Guard was thinking when they released the names, social security numbers, pay and more for the 155th Brigade Combat Team by accident. The data was accidentally posted to an un-secure SharePoint site.

Details of the breach are still unknown, but the National Guard believes it was done inadvertently when uploading files to a new computer system. I’m going to take the liberty of making the leap and saying that it had to be someone with administrative privileges who uploaded the database somewhere it shouldn’t have.

Leave a Reply

Additional articles


Retina CS Vulnerability Management Solution Gets Primetime Award for Innovation

Posted October 12, 2015    Sandi Green

Analyst firm Frost & Sullivan presented BeyondTrust with the 2015 award for ‘Best Practices in Enabling Technology Leadership in the Vulnerability Management Industry.

, ,

Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.