Breaking Up with Obsolete Cybersecurity Practices

by Morey Haber  | 

Some cybersecurity best practices withstand the test of time, remaining unaltered after the passing of decades. Other IT security recommendations have proven more fickle, evolving over fairly short stretches of time to reflect changes in attack vectors, technology stacks, security maturity models, or simply, just better data on what works and what doesn’t. Let’s review some security policies once regarded as best practices, but that it’s now time to break up with. Then, I’ll discuss how to get your employees to unlearn outdated security practices too.

February 2019 Patch Tuesday

by BeyondTrust Research  | 

Welcome back to this month’s Patch Tuesday. Microsoft has patched 76 vulnerabilities this month, including four that had details disclosed prior to patching. One “zero-day” vulnerability in Internet Explorer that was actively being exploited was also patched. The bulk of the patched vulnerabilities this month focus on web browsers.

Achieving Compliance with Malaysia Risk Management in Technology (RMiT)

by Matt Miller  | 

Now that the RMiT BNM/RH/ED 028-11 regulation is in force, it’s imperative for affected organizations to understand the requirements and how to comply with them. BeyondTrust has developed a brief on achieving compliance with the regulation, that also details how BeyondTrust solutions for privileged access management, remote access, and vulnerability management map into the RMiT requirements.