– BeyondTrust, the worldwide leader in Privileged Access Management, today announced it has been awarded a Level 2 Federal Information Processing Standards Publication (FIPS) 140-2 validation for its remote support B300 appliance.
– Have you heard the one about the toothbrush that uses artificial intelligence to tell you to brush harder? Morey Haber of BeyondTrust has and it annoys him intensely. He's seen a company sued because it claimed basic pattern recognition was AI and it just wasn't - and he's had enough.
– Attackers crave insider-level access to IT infrastructure, and to get it, they regularly target insiders - and especially anyone with "super user" or admin-level access - to steal their credentials, says Karl Lankford of BeyondTrust.
– The Internet of Things (IoT) encompasses a growing number of connected devices ranging from security cameras to smart thermostats. Many businesses use enterprise-level IoT devices to help workers get things done more efficiently or to assist with meeting facilities management needs. But, there's one area where enterprise IoT falls short — identity management
– Of the 401 exhibitors at Infosecurity Europe 2019, it is believed that just 13 percent had actually executed full DMARC protection successfully so as to stop potential phishing emails at the gateway.
– According BeyondTrust’s 2019 Privileged Access Threat Report, 64% of businesses globally believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, and 62% believe they’ve had a breach due to compromised vendor access.
– A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, contractors, and third-party vendors with privileged access to their IT networks.
– New research has revealed that 64 per cent of businesses globally believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, while 62 per cent believe they’ve had a breach due to compromised vendor access.
– Most businesses admit to breaches relating to abuse of user credentials, according to a report that highlights cyber hygiene failings in the UK and the importance of greater visibility and integration to cyber defence capability