BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘security’

CustomAuditsAndroid1-680x607

Retina Now Offers Custom Audits for Android Devices

When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing….

Post by Morey Haber May 16, 2012
Tags:
, , , , ,
Marc-Maiffret-NBCChicagoInterview-20121-98x98

NBC Chicago Interviews Marc Maiffret on Email Security

Recently, Marc Maiffret was interviewed on NBC Chicago about the security risks involved when unsubscribing from emails and how to best avoid being compromised by email spam (it does make up 80% of all email traffic in the United States, after all). Below is that interview and an excerpt from the article. Read the entire…

Post by Sarah Lieber May 1, 2012
Tags:
, , , , , ,
einstein

Call it Genius. Our Smart Groups Make Vulnerability Management Simple for Security Teams

eEye R&D has been hard at work on optimizing how our enterprise clients can manage and schedule assessments within Retina CS. These efforts will increase the efficiency of how our clients perform assessments across their IT infrastructure – be it their traditional server or desktop assets, or new technologies like mobile, virtual and cloud.

Post by Morey Haber April 20, 2012
Tags:
, , , , , ,
charliesheen-winning

March VEF Participant Wins a Kindle Fire

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to…

Post by Sarah Lieber April 11, 2012
Tags:
, , , , ,
retina-insight1-680x316

Exploitability in Context

Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for…

Post by Alejandro DaCosta March 28, 2012
Tags:
, , , , , , ,
Picture-5

Missed it Live? On Demand March VEF Now Available + Live Q&A Answered

Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick.

Post by Sarah Lieber March 15, 2012
Tags:
, , , , ,
factormythimage-98x98

Don’t believe everything you hear when it comes to security

Our good friend Ellen Messmer, recently published Network World article “13 security myths you’ll hear — but should you believe?”  , which listed common security myths shared and commented on by some of security’s leading experts and practitioners. Working at a security company, I work (and also sit) closely with a stellar team of researchers….

Post by Sarah Lieber March 1, 2012
Tags:
, , , ,
eeye-451logos

Missed it Live? Watch the “Big Security Data” Webinar with 451 Research & eEye Here.

Recently, 451 Research and eEye hosted the webinar “Turning Your Big Security Data into a Big Advantage”. This discussion was on the topic of “Big Data” and how it relates to today’s security landscape. Featuring 451′s Andrew Hay, we covered how today’s enterprise IT and security teams can best leverage their ‘big security data’ to make…

Post by Sarah Lieber February 29, 2012
Tags:
, , , , , , ,
blindspot-250x165

Driving Security with Blind Spots

For those of us who commute in Southern California, driving isn’t as always as cut and dry as it is in other locations.  For example: say you’re driving down the highway at 70 mph and you realize at the last minute you need to exit 3 lanes over. Obviously you know this requires more than…

Post by Morey Haber January 31, 2012
Tags:
, , ,
ciso-up-at-night-98x98

5 Things That Keep a CISO up at Night

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most…

Post by Sarah Lieber January 20, 2012
Tags:
, , , , , , , , , ,