BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘network security’

sclogoupdated_1448

Our CTO Writes for SC Magazine’s Threat of the Month: SCADA “sport fishing”

Posted July 2, 2013    Sarah Lieber

Our CTO, Marc Maiffret wrote for the SC Magazine column,Threat of the Month: SCADA “sport fishing” section yesterday. Read an excerpt below and read the full article here. What is it? SCADA is not just a focus because of its often critical deployments, but also because performing vulnerability research on SCADA systems is easy, like…

Tags:
, , , , , , , ,
PBIS-operations-dashboard

Our Newest Product Release: PowerBroker Identity Services 7.5

Posted June 26, 2013    Sarah Lieber

We are very excited for the announcement of our latest release of PowerBroker Identity Services 7.5, the industry’s most effective solution for bridging Linux, UNIX and Mac OS X assets into Active Directory. This latest update provides the strongest communications encryption to date, as well as the utmost flexibility with regards to event notification and management….

Tags:
, , , , , , , , , , , ,

June 2013 Patch Tuesday

Posted June 11, 2013    BeyondTrust Research Team

It’s halfway through the year and we are seeing the total bulletin count creep just past fifty. This month, Microsoft is providing patches for Internet Explorer, the Windows kernel (and kernel-mode drivers), Windows print spooler components, and Microsoft Office. There are five bulletins in total, comprised of 1 critical (Internet Explorer) bulletin and the remaining…

Tags:
, , , , , ,
penny

5 steps to securing the small business (that don’t cost a penny)

Posted May 1, 2013    Andy Clark

For many small businesses there are considerable restraints on both budget and personnel that can make implementing a good security practice feel like an insurmountable challenge. Recent news gives us a constant reminder of the threats we all face from hactivists, electronic espionage, and good old fashioned script kiddies out to cause damage. These threats…

Tags:
, , , , , , , , ,
Endpoint Solutions Families

Security Tools for IT

Posted April 30, 2013    Bill Virtue

There is still a divide between the Security Operations Center (SOC) and the Network Operating Center (NOC). Security Operations is more strategic following security best practices to improve corporate security posture (based on business risk) and to ensure implementation of security policies and compliance. While IT is focused on network management, infrastructure availability and SLAs…

Tags:
, , , , ,
security-people

It’s not about the security, it’s about the people

Posted April 25, 2013    Jason Silva

I’ve said it before and I’ll say it again, I’m a big fan of the Doctor Who series. I was watching a recent episode where they needed to hack into a computer system. The Doctor didn’t think Clara, the current leading lady, could do it because the security was too tight. She replied simply, “It’s…

Tags:
, , , , , , , , ,
Java-Logo

Recently Patched Java Vulnerability Exploited In the Wild: How (Not) Surprising

Posted April 23, 2013    BeyondTrust Research Team

A type confusion vulnerability, recently patched in Java 7u21 and Java 6u45, has been spotted in the wild. According to a recent blog post from F-Secure, exploitation of CVE-2013-2423 started shortly after April 21st, 2013 and continues. Given what we know about Java, none of this is surprising. “Why?!” you may ask, “didn’t we all…

Tags:
, , , , , , , , , , , ,
cnbc-uk-video-maiffret

CNBC Interview Featuring our CTO: Security Takes a Backseat in Tech

Posted April 22, 2013    Sarah Lieber

Marc Maiffret, our CTO, was interviewed earlier today in the UK on CNBC. He tells CNBC most aspects of society are being built around technology and most companies aren’t building technology with security in mind. In the interview, Marc states: “Most aspects of society today are being built around technology from every facet. If you…

Tags:
, , , , , ,
572884_503436863_124962594_n

BeyondTrust CTO sits down with IT Harvest’s Richard Steinnon

Posted March 17, 2013    Mike Puterbaugh

BeyondTrust’s CTO, Marc Maiffret, recently sat down with IT Harvest’s Richard Steinnon to discuss a wide range of topics surrounding the security industry today, including the accelerated rate of attacks we’re currently seeing, what our customers are doing to protect themselves, and they even discuss BeyondTrust’s new tagline, Beyond Traditional Security and what that means…

Tags:
, , , , , , , , ,
patch-tuesday

March 2013 Patch Tuesday: Cleaning House

Posted March 12, 2013    BeyondTrust Research Team

Patch Tuesday is upon us and this month, Microsoft is doing a little spring cleaning of vulnerabilities, fixing a well-rounded collection of client-side vulnerabilities, along with a few server-side vulnerabilities for good measure. This month, the affected software includes Internet Explorer, Silverlight, Visio Viewer, SharePoint, OneNote, Outlook for Mac, and a Windows kernel-mode driver. In…

Tags:
, , , ,