BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘Compliance’

forbes-logo_featuredimage

How To Prepare For When The SEC Comes Asking About Cybersecurity Risk | BeyondTrust CEO Featured in Forbes

Posted May 15, 2013    Mike Puterbaugh

Our CEO John Mutch was recently invited to share his thoughts on an increasingly talked-about subject in the IT industry – the potential for the SEC to assume oversight over public companies cyber risk programs – in essence asking them to report on the viability of their security and compliance operations – in the face…

Tags:
, , , , ,
Virtual Insecurity Infographic FINAL

Virtual Insecurity, and Ways to Combat It

Posted May 8, 2013    Mike Puterbaugh

Stating the obvious, our customers continue to make investments in virtualization. To support them, BeyondTrust has always been on the leading edge of providing tools and solutions in that regard. Whether it for managing privileges on virtual hosts, or scanning private cloud assets for flaws, BeyondTrust has always been at the forefront of security and…

Tags:
, , ,
penny

5 steps to securing the small business (that don’t cost a penny)

Posted May 1, 2013    Andy Clark

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

Tags:
, , , , , , , , ,
security-people

It’s not about the security, it’s about the people

Posted April 25, 2013    Jason Silva

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

Tags:
, , , , , , , , ,
jpeg blog pic

Die Hard – Windows XP Against the World

Posted April 8, 2013    Mike Puterbaugh

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

Tags:
, , ,
MandiantAPT1report

Mandiant APT1 report, some unanswered questions.

Posted February 21, 2013    Marc Maiffret

For the last several years there has been an increasing number of accusations being made against China and its military as being behind the systematic targeting of organizations throughout the world in a sophisticated hacking campaign to steal data and access to further China’s economic, military and social agendas. These accusations come from a mass…

Tags:
, , , ,
Hiding in plain sight

IT Security’s Best Kept Secret – Hiding in Plain Sight

Posted January 22, 2013    Mike Puterbaugh

This blog post was first posted on Wired.com on January 22nd, 2013. It can be found, in it’s original formatting, here: http://insights.wired.com/profiles/blogs/it-security-s-best-kept-secret-hiding-in-plain-sight               There’s a reason the old saying “an ounce of prevention is worth of a pound a cure” resonates in so many situations – because it’s true….

Tags:
, , , , , , ,
img31

CCOs: Let Threat Analyzer do the heavy lifting

Posted June 20, 2012    Jerome Diggs

In a recent article on Dark Reading, The Compliance Officer’s Dirty Little Secret, the topic of how Chief Compliance Officers (CCO) form their decision making process(es) around compliance was brought to light. One major decision CCOs are responsible for making is whether to pay the fines associated with non-compliance versus the cost of achieving compliance. …

Tags:
, , , , , , ,
factormythimage-98x98

Don’t believe everything you hear when it comes to security

Posted March 1, 2012    Sarah Lieber

Our good friend Ellen Messmer, recently published Network World article “13 security myths you’ll hear — but should you believe?”  , which listed common security myths shared and commented on by some of security’s leading experts and practitioners. Working at a security company, I work (and also sit) closely with a stellar team of researchers….

Tags:
, , , ,
ciso-up-at-night-98x98

5 Things That Keep a CISO up at Night

Posted January 20, 2012    Sarah Lieber

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most…

Tags:
, , , , , , , , , , , ,