BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Front Page of the New York Times

Posted March 1, 2012    Peter McCalister

Another day, another security breach. From the government, to banks, to healthcare, to major retailers, to beloved consumer brands, the only thing that seems safe to say is that no one is immune to the threats of today’s Internet-connected world. With strict breach notification legislation and regulations and the tenacity of today’s media, information security concerns are top of mind for businesses and consumers alike, pushing businesses that have not yet properly invested in the development of information security programs to get the right systems in place.

Billions of dollars have been spent by companies to keep the bad guys out, but it turns out, the biggest threat was, and always has been inside the network perimeter. Security risks introduced by over-privileged security accounts are one of the biggest causes for concern. Employees with full admin privileges can do whatever they desire with corporate desktop assets and ultimately may use that privilege to delete, modify or steal data – either accidentally or intentionally.

Additionally, inadequately secured and monitored passwords expose great security risks to organizations. Companies need to have the ability to track and log the use of passwords, while having visibility into the granular details about when someone logged in, the keystrokes they performed and the information they accessed, as well as having fast response time if a breach were to occur.

Without the right systems, in place organizations of all shapes and sizes leave themselves at risk for a breach and making the front page of the New York Times – but perhaps not for a reason they like.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,