Four hidden costs and cyber security risks of sudo

– It is always a philosophical debate as to whether to use open source software in a regulated environment. In the case of ‘sudo’—a package designed to provide privileged access included in many Linux distributions—the debate is whether it meets the requirements of an organization, and to what level it can be relied upon to deliver compliance information to auditors. While every organization is different, BeyondTrust CTO Morey Haber says there are four specific risks/costs that you should consider before deciding if sudo is right for your organization.

Continue Reading

Cutting Through the Hype―The Realistic Flaws of a Zero Trust Security Model

– A zero-trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is relevant today since technologies and processes like the cloud, DevOps, and IoT have either blurred, or completely dissolved, the idea of a traditional perimeter. But, as BeyondTrust CTO Morey Haber explains in this byline article, while zero trust has become a trendy catchword in IT, in practice, it remains more of a theoretical concept as opposed to one that organizations can implement, for a couple of reasons.

Continue Reading

Security Best Practices For Conversation Marketing And Chatbots

– Vendors, service providers and even government agencies have been rapidly deploying chat-based features to field requests from sales to support. It is typically unknown to the user if they are getting a real person or a machine. With a little social engineering, a threat actor can determine which one is behind the scenes. Regardless of human or machine, there are some interesting security risks to chat-based services.

Continue Reading

Cyberattacks are putting lives at risk

– Karl Lankford, for BeyondTrust, explores previous attacks to industry and draws on findings from an access threat report: Cyberattacks are putting lives at risk via administrative back doors left open.

Continue Reading