BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘Microsoft’

media-coverage-98x98-98x97

Media RoundUp | Patch Tuesday June 2012

Posted June 14, 2012    Sarah Lieber

The June 2012 installment of Patch Tuesday was easily one of the most active of the year so far, in terms industry commentary and predictions, driven by the more than two-dozen security vulnerabilities across several of Microsoft’s products. As I’m sure many of you are still catching up on the news, for your convenience I’ve…

Tags:
, , , ,
charliesheen-winning

March VEF Participant Wins a Kindle Fire

Posted April 11, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Tags:
, , , , ,
Picture-5

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Posted March 15, 2012    Sarah Lieber

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Tags:
, , , , ,
charliesheen-winning

January VEF winner announced. Takes home an Amazon Kindle Fire.

Posted January 26, 2012    Sarah Lieber

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Tags:
, , ,
sticky

Automating Configuration Auditing

Posted March 15, 2011    Morey Haber

????????I want to discuss a rather simple use case with my readers that until recently, had a rather complex solution. Consider you are a major airline, corporation, or even a local government with thousands of systems that should be identical from a configuration perspective. These could be airline check-in kiosks, a call center handling support calls,…

Tags:
, , , , , , , , ,

Benchmarks as a Point of Reference

Posted November 3, 2010    Morey Haber

I have been reading Stephen Hawking’s new book, “The Grand Design” and am completely stunned by the analogies he uses to simplify perception, measurements, and even quantum physics. This book is not light reading and has had me looking up terms using old college textbooks and Google multiple times. The one thing that fascinates me…

Tags:
, , , , , , , ,

Microsoft Patch Tuesday – August 2010

Posted August 10, 2010    Chris Silva

As everyone knows by now, this was a gigantic patch Tuesday with Microsoft delivering 14 security bulletins (in addition to the out-of-band bulletin from last week).  On top of that, Adobe patched Flash and ColdFusion.  It is once again going to be a long night for IT and security engineers everywhere. One important thing to note is…

Tags:
, ,

Mass Infection via SQL Injection of IIS Websites

Posted June 9, 2010    Chris Silva

Multiple security outlets have released reports regarding a mass SQL injection attack that has compromised a large number of public websites – Google search results currently show that over 100,000 pages have been infected. This attack targets Microsoft IIS servers running both ASP and MSSQL.  The automated injection routine appears to leverage a vulnerability in…

Tags:
, ,