Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


Posts Tagged ‘Compliance’


Going Beyond SCAP for Benchmark Compliance

Posted February 24, 2014    Morey Haber

SCAP configuration compliance assessments, commonly referred to as “Benchmark” assessments, are traditionally cumbersome tasks when multiple benchmarks have to be tested against multiple targets at the same time. For the vast majority of SCAP-certified tools, this means executing one benchmark at a time against a valid host(s) and reviewing the results. The same targets often…

, , , , , ,

Top 10 Reasons You Need Privileged Account Management Now

Posted July 29, 2013    Paul Harper

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

, , , , , ,

Getting a gold star in compliance

Posted July 9, 2013    Mike Yaffe

You know I realize that I’m getting older after I lived through “this is gonna be the big year for PKI (heard that for 4 straight years, and I’m still waiting)”, or “everyone will have a digital certificate on all their credit cards next year”, or “security and compliance are two different things.” As for…

, , , , , , ,

Our Newest Product Release: PowerBroker Identity Services 7.5

Posted June 26, 2013    Sarah Lieber

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management….

, , , , , , , , , , , ,

How To Prepare For When The SEC Comes Asking About Cybersecurity Risk | BeyondTrust CEO Featured in Forbes

Posted May 15, 2013    Mike Puterbaugh

Our CEO John Mutch was recently invited to share his thoughts on an increasingly talked-about subject in the IT industry – the potential for the SEC to assume oversight over public companies cyber risk programs – in essence asking them to report on the viability of their security and compliance operations – in the face…

, , , , ,
Virtual Insecurity Infographic FINAL

Virtual Insecurity, and Ways to Combat It

Posted May 8, 2013    Mike Puterbaugh

Stating the obvious, our customers continue to make investments in virtualization. To support them, BeyondTrust has always been on the leading edge of providing tools and solutions in that regard. Whether it for managing privileges on virtual hosts, or scanning private cloud assets for flaws, BeyondTrust has always been at the forefront of security and…

, , ,

5 steps to securing the small business (that don’t cost a penny)

Posted May 1, 2013    Andy Clark

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

, , , , , , , , ,

It’s not about the security, it’s about the people

Posted April 25, 2013    Jason Silva

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

, , , , , , , , ,

Die Hard – Windows XP Against the World

Posted April 8, 2013    Mike Puterbaugh

Today marks the beginning of a significant year-long event in the worldwide computer industry – a year from today, Microsoft will end support for the Windows XP Operating System. Mainstream support had already ended in 2009  and this new milestone marks the end of security updates on the platform. Are you ready? According to a…

, , ,
The words Cyber Attack revealed in computer machine code through a magnifying glass

Mandiant APT1 report, some unanswered questions.

Posted February 21, 2013    Marc Maiffret

For the last several years there has been an increasing number of accusations being made against China and its military as being behind the systematic targeting of organizations throughout the world in a sophisticated hacking campaign to steal data and access to further China’s economic, military and social agendas. These accusations come from a mass…

, , , ,