Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


Posts Tagged ‘threats’


Basic Blocking and Tackling for Defending Against Advanced Targeted Attacks

Posted January 22, 2015    Larry Brock

With football season at its pinnacle at both the college and professional levels, the best teams continually focus on the fundamentals that make them successful. In security, we need to do the same.  It is okay for us to have a few key plays, especially in certain industries where we have to focus on unique…

, , , , ,

How to Stop Pass-the-Hash Attacks on Windows Desktops

Posted June 2, 2014    Morey Haber

The recent publication of attack techniques and the lack of preventative tools have forced enterprises to rely on ineffective techniques to mitigate this risk. Fortunately, by removing administrative rights from all users and leveraging a Windows privilege management solution like PowerBroker for Windows, you can mitigate this risk throughout your organisation. Some of these techniques…

, , , , , , , , ,
Retina CS vulnerability management interface

BeyondInsight Evolution is Paving the Way for a Revolution in IT Risk Management

Posted May 27, 2014    Morey Haber

2008: Unifying Vulnerability Management + Endpoint Protection It all started in 2008, when eEye Digital Security transformed its REM management platform into Retina CS, a solution that could do more than just vulnerability management. Retina CS (short for “Compliance and Security” – or, as we joke internally, for “Chris Silva” our Chief Architect) merged the…

, , , , , , ,

How Active Directory Can Reduce Threats to Your Business

Posted April 7, 2014    Gail Ferreira

Chances are you’re running Microsoft Active Directory and utilizing its built-in safeguards. However, even with native AD protections, your operations might still be jeopardized by unintentional or malicious actions. Here are two ways to augment Active Directory’s onboard auditing capabilities and keep your business up and running to its maximum potential: 1. Ensure Security and…

, , , , , , , , ,