Let’s face it – organizations cannot simply build walls to protect vital information anymore. However, in the process of adapting to this new virtual collaborative environment comes the enormous challenge of ensuring that privileged access to critical information is not misused. Walls that may have worked a decade ago are now practically irrelevant as users seek ways around, over, or under these obstructions because it interferes with their main job duties.
Stopping Good People From Doing Bad Things With Admin Rights
This month’s Patch Tuesday is on the lighter side, offering up six bulletins and 33 vulnerabilities in total. The critical bulletins to watch out for involve IE, JScript/VBScript, and Windows Shell.
Analyst firm Frost & Sullivan presented BeyondTrust with the 2015 award for ‘Best Practices in Enabling Technology Leadership in the Vulnerability Management Industry.
“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.