BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘netsec’

August VEF Participant Wins a Kindle Fire

Posted August 19, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Tags:
, , , , , , , , , , ,
New-Audit-Review-screenshot

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Posted July 31, 2013    Morgan Holm

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless…

Tags:
, , , , , , , , , , , ,

Controlling User Accounts and Regulatory Compliance

Posted July 15, 2013    Morey Haber

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Tags:
, , , , , , , , , , , ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Posted July 2, 2013    Sarah Lieber

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Tags:
, , , , , , , ,
guy-stress-m

Do you want to do this the “hard” way?

Posted May 28, 2013    Mike Yaffe

Too often I see people working on what they can fix, what is easy. It’s like when I exercise, if I see progress I keep working at it but the problem areas (there are a lot of them) can wait until tomorrow. Over the past several years I see organizations doing a better job with…

Tags:
, , , , ,
sclogoupdated_1448

BeyondTrust Retina CS Earns Perfect 5 Star Rating by SC Magazine

Posted February 4, 2013    Sarah Lieber

We are happy to announce that for the 5th year in a row, SC Magazine has given a glowing review of Retina CS Threat Management Console with 5 stars across all its judging categories. SC Magazine tests all products in the most logical way: they vulnerability or pen tested them directly. Their “…results were excellent and…

Tags:
, , , , , , ,
patch-tuesday

Patch Tuesday June 2012: RDP broken, again. Stuxnet TTF, again.

Posted June 12, 2012    BeyondTrust Research Team

This is shaping up to be an interesting Patch Tuesday with critical vulnerabilities being released across a combination of operating system components and client applications. In total there are 7 Microsoft Security Bulletins covering 26 distinct vulnerabilities in this June 2012 Microsoft Patch Tuesday. More than half of these vulnerabilities are rated as being likely…

Tags:
, , , , , ,
RiskMatrixbyVuln-5.14.12-98x98

Work Smarter with Retina Insight Threat Analyzers

Posted May 17, 2012    Morey Haber

It keeps happening over and over again. I speak to a prospect, and they do not want yet another vulnerability report with pages and pages of assets and vulnerabilities. Every tool vulnerability assessment scanner can produce this with various degrees of customization and consolidation but a 1,000 page report for a few dozen assets doesn’t…

Tags:
, , , , , ,
Picture 3

BeyondTrust and eEye Acquisition Announcement Now On Demand

Posted May 16, 2012    Sarah Lieber

There’s been a good amount of buzz surrounding our announcement that BeyondTrust acquired eEye Digital Security. We’re very excited about it and the opportunity the combined company has to provide an unmatched protection strategy for both the internal and external threats that target today’s enterprise. A couple of days ago, executives from both BeyondTrust and…

Tags:
, , , , , ,