Global BeyondTrust PR Team press@beyondtrust.com

USA 1 (770) 407-1832

UK +44 (0)161 880 2682

USA, Asia Pacific PR Agency

Mike Bradshaw, Connect Marketing

mikeb@connectmarketing.com

1 (801) 373-7888

UK PR Agency

Octopus Group

beyondtrust@octopusgrp.com

+44 (0)20 3772 8899

France PR Agency

Eloïse Provino, La Nouvelle Agence

eloise@lanouvelle-agence.com

+33 (0)6 43 68 96 37

Germany PR Agency

Heiko Scholz, Agentur SCHOLZ PR

beyondtrust@scholzpr.de

+49 (0) 64 51 71 51 05

How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips

– Just because you’ve invested in a smartphone that isn’t exposed to quite the same degree of malware and exploit issues as an Android device, that doesn’t mean you can safely ignore good practice when it comes to iPhone security. This is why I’ve asked 12 security experts to share their knowledge as far as keeping your iPhone secure is concerned. Here are their 26 tips to help you do just that.

Continue Reading

Access Denied, Just-In-Time: Protecting your organisation from internal threats

– We regularly read headlines about how employees are the biggest threat to company data, in fact, recent research found that 64% of organisations believe that they’ve likely had either a direct or indirect breach due to employee access in the last 12 months, and that 52% of businesses are very or fairly concerned about sabotage from a former employee. Take Tesla for example, who admitted to being a victim of a data leak due to an unhappy employee, who made changes to company source code and exported gigabytes of proprietary data to unknown third parties.

Continue Reading

CTO Sessions: Morey Haber, BeyondTrust

– With more than 20 years of IT industry experience, Morey Haber serves as the CTO and CISO for BeyondTrust. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently oversees solutions for privileged account management.

Continue Reading

Cloud Security essentials - session monitoring

– "What is often overlooked is the potential sensitivity and security of recorded sessions, just like having cameras in your home. This is similar to the security of preventing an over-the-shoulder attack from occurring in the first place. The access needs to be restricted."

Continue Reading

#HowTo Combat the Insider Threat

– Insider threats pose a huge risk to business security, be it employees, both present and past, or freelancers and contractors. These users have an elevated level of access to privileged accounts and are armed with information capable of crippling a business.

Continue Reading

Suspected Iranian cybercriminals target universities for intellectual property

– Suspected Iranian nation-state threat group Cobalt Dickens has launched a new global attack campaign to steal intellectual property, discovered Secureworks Counter Threat Unit (CTU) researchers. ​The group, also known as Silent Librarian, has been using spoofed library services login pages as part of a campaign targeting academics in order to steal intellectual property.

Continue Reading