BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘BeyondTrust’

SMART_PERSON

Security Intelligence: Finding Out What Part Actually Makes You Smart

Organizations of all sizes having been trying to address Big Data, Security Intelligence and contextual security for awhile, but without much success. For security folks in particular this is a sensitive topic, as nestled among the thousands of lines of code or logs files is what they need to know to prevent the next successful breach. SIEM…

Post by Mike Yaffe April 12, 2013
Tags:
, , , , ,
215px-SOAP_poster

Hackers on a Plane

If I were cast in a movie in which the plotline centered on a person on a plane maliciously controlling the entire 550MPH Pringles Can via smartphone, I’d demand the movie be called ‘Hackers on a Plane’, just so people knew what they were getting into when purchasing their matinee ticket. However, this seemingly far-fetched…

Post by BeyondTrust Research Team April 11, 2013
Tags:
, , ,

April 2013 Patch Tuesday

Patch Tuesday is here again, and April’s collection of patches will fix vulnerabilities across various pieces of Microsoft operating systems and software. This includes Internet Explorer, the Remote Desktop Client, SharePoint, the Windows kernel (and some kernel-mode drivers), Active Directory, the Windows Client/Server Run-time Subsystem (CSRSS), Microsoft Antimalware Client, and an HTML sanitization component in…

Post by BeyondTrust Research Team April 9, 2013
Tags:
, , ,
img-oracle-logo

BeyondTrust & Oracle, The Perfect Partnership

No one will dispute that Oracle is a heavyweight when it comes to the relational database market, but Oracle is far more than a one trick pony.  Oracle has a plethora of enterprise products and hardware solutions that will fit the needs of almost any business.  However the key to success for many of the…

Post by BeyondTrust Product Management April 8, 2013
Tags:
, , , , , , ,
jpeg blog pic

Die Hard – Windows XP Against the World

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

Post by Mike Puterbaugh April 8, 2013
Tags:
, , ,
Closing the Door on Hackers

Closing the Door on Hackers – from the New York Times

I recently had the pleasure of contributing an Op-Ed piece to The New York Times. In the article, I talk about some of the aspects of cyber-security that I think are far too-often left out of mainstream media discussions. Specifically, the shared burden that all of us in the technology industry should feel in helping…

Post by Marc Maiffret April 5, 2013
Tags:
, , , ,
trojanhorse

Vendor-Disclosed Zero Days and Targeted Trojans

Here at BeyondTrust, we are constantly keeping an eye on the underground parts of the internet, monitoring for things like zero day vulnerabilities and how malware authors are exploiting vulnerabilities in the wild. As such, we wanted to keep you apprised of a vulnerability that was addressed within VMware ESXi 5.0. A patch was released…

Post by BeyondTrust Research Team April 3, 2013
Tags:
, , , , , , ,
lucy2

Least Privilege and South Korea

No, this isn’t some editorial piece about the interrelationships of varying social strata in South Korean society and Gangnam Style. Despite how interesting that may be, we are instead taking a quick look at the latest “wiper” malware to strike fear in the hearts of CTOs and IT admins alike – DarkSeoul (or Jokra or…

Post by BeyondTrust Research Team March 26, 2013
Tags:
, , , ,
572884_503436863_124962594_n

BeyondTrust CTO sits down with IT Harvest’s Richard Steinnon

BeyondTrust’s CTO, Marc Maiffret, recently sat down with IT Harvest’s Richard Steinnon to discuss a wide range of topics surrounding the security industry today, including the accelerated rate of attacks we’re currently seeing, what our customers are doing to protect themselves, and they even discuss BeyondTrust’s new tagline, Beyond Traditional Security and what that means…

Post by Mike Puterbaugh March 17, 2013
Tags:
, , , , , , , , ,
MandiantAPT1report

Mandiant APT1 report, some unanswered questions.

For the last several years there has been an increasing number of accusations being made against China and its military as being behind the systematic targeting of organizations throughout the world in a sophisticated hacking campaign to steal data and access to further China’s economic, military and social agendas. These accusations come from a mass…

Post by Marc Maiffret February 21, 2013
Tags:
, , , ,