BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Vulnerability Expert Forum Highlights: April 2014

Posted April 16, 2014    Chris Burd

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation.

Latest critical vulnerabilities, vendor patches, and zero-day threats
This month, Microsoft released four security bulletins and patches that repair a total of 11 remote code execution vulnerabilities. These patches affect Microsoft Word and Office Web Apps, Internet Explorer, Windows File Handling Component, and Microsoft Publisher.

Patch criticality and prioritization
The two most critical patches include MS14-017 (Microsoft Office 2010) and MS14-018 (Internet Explorer, all versions except IE 10) — administrators should deploy these patches immediately to prevent exploitation by attackers, following up with patches MS14-019 (Windows File Handling) and MS14-020 (Microsoft Publisher 2003, 2007).

Security in the news
The experts also provided insight into the following security news topics:

  • The Global security phenomenon Heartbleed, the OpenSSL bug, which allows hackers to disclose 64KB of memory.
  • The new threat of remote USB attacks for USBs running remote USB redirection.
  • Banks to be hit with Microsoft costs for running out-of-date Microsoft XP on ATMs.
  • The NSA using inactive Botnets for their own purposes.
  • The Tesla Model S pleasantly surprises users with a few IT-tweaks.

Check out this recording of the 30-minute presentation for more details:

> Register for next month’s VEF webcast
> Request a trial of Retina Network Security Scanner

Tags:
, , , , ,

Leave a Reply

Additional articles

pbps-blog2

10 Ways to Ensure Your Privileged Password Management Strategy Will Succeed

Posted April 27, 2015    Scott Lang

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organisation. But if passwords are such a no-brainer, why do so many data breaches tie back to poor password management?

Tags:
, , , , , , , ,
beyond-trust

PowerBroker for Windows – Most Innovative IAM Solution by Cyber Defense Magazine

Posted April 21, 2015    Scott Lang

PowerBroker for Windows has been selected as a winner by the 2015 Cyber Defense Magazine Awards Program in the category of “Most Innovative Identity and Access Management Solution”.

Tags:
, , ,
pbps-customer-campaign-image

Are you changing your passwords as often as the weather changes?

Posted April 20, 2015    Scott Lang

There is one thing that should change more frequently than the weather: Your privileged passwords. Why? If you’re like more than 25% of companies out there, then your current IT environment contains unmanaged accounts putting you at risk of data breaches and compliance violations, and you don’t have a process to control those accounts.

Tags:
, , , ,