BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘mobile security’

chalk cliff in england-resized-600.jpg

Privilege Identity Management – A Help Desk Perspective

Help desk technicians within a company are the first line of defensive for a new project or system problem. Most of the time, they are informed and trained that users will be getting a new piece of security software. The solution, in this case, is called Privileged Identity Management (PIM) and is designed to manage authenticated permissions…

Post by Morey Haber October 12, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
img-android

Off the beaten Google Market

There have been a number of recent articles and blog posts around Android devices infected with various malware and malicious apps.  One recent nasty piece of malware found in many Chinese Android app stores is ‘Trojan!MMarketPay.A@Android’.   The interesting feature of this malware is that it can run up an unsuspecting user’s cell phone bill by…

Post by Jerome Diggs July 10, 2012
Tags:
, , , , , , , ,
cloudsecurity-98x98

Retina CS Turns Patch Tuesday into Simply “Tuesday”

Last week we announced Retina CS 3.0 – which extends our already market-leading vulnerability management capabilities for mobile devices – by adding in support for Android devices, as well as Microsoft Exchange ActiveSync – and sets a new bar for enterprise cloud security, allowing private cloud deployments based on Amazon Web Services (AWS) and VMware…

Post by Mike Puterbaugh February 15, 2012
Tags:
, , , , , ,
ciso-up-at-night-98x98

5 Things That Keep a CISO up at Night

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most…

Post by Sarah Lieber January 20, 2012
Tags:
, , , , , , , , , ,
img-64

Samsung Mobile Devices Vulnerable to Website Wipe

According to IBTimes, Samsung, one of the leaders in manufacturing Android devices, has a very serious bug in their TouchWiz implementation of Android. Samsung, like most manufacturers, modifies the stock Android image to add in its own modifications and enhancements.

Post by Peter McCalister October 16, 2011
Tags:
, , ,