Месечен архив: март 2012

Least Privilege Can Help Solve IT Negligence

The Ponemon Institute along with Trend Micro recently surveyed more than 700 ITenterprise security professionals on the subject of the human factor in data breaches. According to the survey, 78 percent of respondents have experienced a data breach as a result of negligent or malicious employees or other insiders. This doesn’t surprise us here at …

Прочетете повече »

BeyondTrust Continues Aggressive Push with Record Growth in 2011

Press Releases CARLSBAD, Calif., – Feb. 28, 2012 – BeyondTrust today announced that it achieved record financial performance in 2011 with 20 percent year-over-year sales growth, positioning the company as the leading provider of insider threat mitigation for global enterprises. The company’s substantial success over the past year can in part be attributed to the …

Прочетете повече »

How much you spend on information security?

The balance between money spent and security achieved is one of the most important aspects of information security. If a company has unlimited funds it could invest the funds into security and become “unhackable”. An effective example of this approach in physical world is security of country leaders. However, most of organizations have limited funds …

Прочетете повече »

Identity Management is Best in Enterprise Security

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could …

Прочетете повече »

Granular Control is Gold

I you haven’t noticed, there are some things in our enterprises that we just can’t afford to leave generic. Certain things need to be fine-tuned and customized in ensure the success (and security) of each individual company. One of these is the level of privilege each user has. You need to be able to define how …

Прочетете повече »

Insider Threats Can Start from the Outside, Too

The term insider threats used to spark images of malicious employees stealing copies of files or looking at information they weren’t supposed to, but in today’s complex world of technology, insider threats have evolved.   According to a preliminary version of the Verizon 2012 Data Breach Investigations Report, 92 percent of attacks analyzed were external in …

Прочетете повече »

Do You Know Where Your Linux/UNIX Users Are?

Sure you do, you say. You have someone responsible for managing Linux and UNIX user accounts. She manages the user store, grants user access to specific Linux/UNIX servers, and assigns specific privileges to users on those servers. When someone leaves the company, she makes sure the specific user accounts are removed. When someone assumes a …

Прочетете повече »

По-стари публикации «