BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

We Are Now Entering The “Goldilocks Zone”

Post by Peter McCalister December 28, 2011

Turns out that Goldilocks isn’t just a children’s story, or even a metaphor used by marketing-types extolling the vices of extremeism and the virtues of “just right” privileges.

Yep, even astronomers coop Goldilocks to describe the perfect zone for habitable planets. In a recent Associated Press article titled “New Earth-like Planet Discovered Outside Our Solar System” it was reported that the possibility for a habitable planet besides Earth might have finally been located. The article goes on further to state “The planet is smack in the middle of what astronomers call the Goldilocks zone, that hard to find place that’s not too hot, not too cold, where water, which is essential for life, doesn’t freeze or boil. And it has a shopping mall-like surface temperature of near 72 degrees, scientists say.”

Shopping mall-like temperatures not withstanding, it is still a good lesson for every IT professional concerned with security and the impact of outsider versus insider threat as it relates to the potential for data loss. The results have been well documented and can be manifest in:

Data loss
Data corruption
Data theft
Hard costs for remediation
Soft costs in productivity impact
Embarrassment costs if headlines hit
Stock price hit (for publicly traded companies if breach was significant enough)

Avoid too much privilege and too little privilege by implementing a least privilege solution today.

Leave a Reply

Additional articles

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,