BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Survey Finds Compliance to be Top Security Concern

Posted May 10, 2011    Peter McCalister

This week ISACA released results from its Top Business/Technology Issues Survey, which revealed that issues such as regulatory compliance, governance and information security management continue to top the list of enterprise IT concerns.

Fueled by the challenge of the global economy and greater numbers of government mandated standards and regulations, particularly around privacy issues, compliance is the issue most top of mind, with 53 percent citing privileged access monitoring and segregation of duties as their biggest concern.

To most of us in this space, these results come as no surprise. In addition to added regulations, the seemingly endless numbers of high profile data breaches are potentially keeping more CTOs and CIOs up at night. Add to that the latest and greatest technologies beginning to dominate the enterprise – mobile hardware and applications, cloud computing, virtualization, to name a few – and you have a significantly more complicated network environment, and exponentially increased associated risk.

The good news is that as enterprises begin to pay more attention to privileges and access, they are more enthusiastically embracing the principal of least privilege as it relates to improving their overall security posture. With more and more threats and privacy breaches generated from inside the enterprise, securing the perimeter within becomes more of a central and critical focus.

Leave a Reply

Additional articles

webinar 2

On Demand Webinar: Because Auditing Stinks Sometimes

Posted July 2, 2015    Lindsay Marsh

Auditing stinks. Well, mostly stinks. In this on demand webinar, lead by Group Policy MVP Jeremy Moskowitz, you’ll learn the three key tenets to real Group Policy auditing. Tenet 1: Why do you care about Group Policy auditing? Tenet 2: How does Eventing help you know “Who did what?” Tenet 3: How does Reporting tell…

Tags:
, , , ,
skeletonkey3_713678_713680

Stopping the Skeleton Key Trojan

Posted June 29, 2015    Robert Auch

Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts.

Tags:
, , , , ,
webinar 2

On Demand Webinar: 10 Steps to Building an Effective Vulnerability Management Program

Posted June 26, 2015    BeyondTrust Software

In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now.

Tags:
, ,