BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘network security’

pbps-full-list-pbps-manages-incl-systems-and-accounts

Top 10 Reasons You Need Privileged Account Management Now

Don’t under estimate the complexity organizations face with managing and sharing access to privileged accounts. BeyondTrust has a wide variety of solutions that address the various challenges of privileged accounts.  Here are 10 key reasons our customers need and value the PowerBroker Password Safe solution: 1. EVERYONE has trouble managing privileged passwords – While some…

Post by Paul Harper July 29, 2013
Tags:
, , , , , ,

Controlling User Accounts and Regulatory Compliance

PCI DSS Requirement 8 requires that organizations must be able to identify and log all user and administrative access to information systems and applications containing credit card and personally identifiable information. In addition, environments must also have a unique ID for every individual that will have computer access to these systems.  This simple requirement can…

Post by Morey Haber July 15, 2013
Tags:
, , , , , , , , , , ,
gold-star

Getting a gold star in compliance

You know I realize that I’m getting older after I lived through “this is gonna be the big year for PKI (heard that for 4 straight years, and I’m still waiting)”, or “everyone will have a digital certificate on all their credit cards next year”, or “security and compliance are two different things.” As for…

Post by Mike Yaffe July 9, 2013
Tags:
, , , , , , ,
sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Post by Sarah Lieber July 2, 2013
Tags:
, , , , , , , ,
PBIS-operations-dashboard

Our Newest Product Release: PowerBroker Identity Services 7.5

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management….

Post by Sarah Lieber June 26, 2013
Tags:
, , , , , , , , ,

June 2013 Patch Tuesday

It’s halfway through the year and we are seeing the total bulletin count creep just past fifty. This month, Microsoft is providing patches for Internet Explorer, the Windows kernel (and kernel-mode drivers), Windows print spooler components, and Microsoft Office. There are five bulletins in total, comprised of 1 critical (Internet Explorer) bulletin and the remaining…

Post by BeyondTrust Research Team June 11, 2013
Tags:
, , , , , ,
penny

5 steps to securing the small business (that don’t cost a penny)

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

Post by Andy Clark May 1, 2013
Tags:
, , , , , , , , ,
Endpoint Solutions Families

Security Tools for IT

There is still a divide between the Security Operations Center (SOC) and the Network Operating Center (NOC). Security Operations is more strategic following security best practices to improve corporate security posture (based on business risk) and to ensure implementation of security policies and compliance. While IT is focused on network management, infrastructure availability and SLAs…

Post by Bill Virtue April 30, 2013
Tags:
, , , , ,
security-people

It’s not about the security, it’s about the people

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

Post by Jason Silva April 25, 2013
Tags:
, , , , , , , , ,
Java-Logo

Recently Patched Java Vulnerability Exploited In the Wild: How (Not) Surprising

A type confusion vulnerability, recently patched in Java 7u21 and Java 6u45, has been spotted in the wild. According to a recent blog post from F-Secure, exploitation of CVE-2013-2423 started shortly after April 21st, 2013 and continues. Given what we know about Java, none of this is surprising. “Why?!” you may ask, “didn’t we all…

Post by BeyondTrust Research Team April 23, 2013
Tags:
, , , , , , , , , , , ,