BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘Compliance’

factormythimage-98x98

Don’t believe everything you hear when it comes to security

Posted March 1, 2012    Sarah Lieber

Our good friend Ellen Messmer, recently published Network World article “13 security myths you’ll hear — but should you believe?”  , which listed common security myths shared and commented on by some of security’s leading experts and practitioners. Working at a security company, I work (and also sit) closely with a stellar team of researchers….

Tags:
, , , ,
ciso-up-at-night-98x98

5 Things That Keep a CISO up at Night

Posted January 20, 2012    Sarah Lieber

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most…

Tags:
, , , , , , , , , , , ,
pillars

Top VM Reports for Government

Posted March 21, 2011    Morey Haber

In continuing the series on top reports for vertical markets, this blog will focus on reports that help government entities at the state, local, and federal levels. Like any vertical, having reports that are dedicated to the mandates and requirements that matter to the organization are critical. It is not only about which vulnerabilities are…

Tags:
, , , ,
img-mobile

Referential Integrity When Performing a Vulnerability Assessment

Posted January 25, 2011    Morey Haber

James Thurber wrote back in 1959, “When all things are equal, translucence in writing is more effective than transparency, just as glow is more revealing than glare.” The critical aspect of his statement is based on equality. When using multiple distributed applications, regardless of technology, having the same version on all the systems is sometimes…

Tags:
, ,

Too Many Regulatory Standards, Only One Tool Please

Posted November 12, 2010    Morey Haber

About every two years, I indulge myself with a new laptop. This time, I waited almost three years and will be retiring my old Dell XPS M1330 for a new Alienware M15x. I wanted raw horsepower for virtual machines in a laptop format and was not as concerned about battery life (since I carry an…

Tags:
, , , , , , , , , , , , , , , , ,

Configuration Compliance and Regulatory Reporting

Posted September 9, 2010    Brad Hibbert

In recent years there have been an increasing number of legislated regulatory mandates with which organizations must comply with to prove the confidentiality, integrity and availability of information stored in their systems and provided through external parties. After reading various whitepapers, websites and other articles that loosely use the terms “PCI, HIPAA, SOX, CIS, NIST,…

Tags:
, , , , , , , , , , , ,

Video: eEye’s Support of Government Standards

Posted September 7, 2010    Marc Maiffret

For many years now, eEye has had a strong partnership with the government to help both educate and support important security standards that help to create a common language and framework for security technologies to inter-operate. We have led the way with supporting many government security standards and frameworks within our products and typically well…

Tags:
, , , ,