North America & UK

Mike Bradshaw, Connect Marketing

mikeb@connectmarketing.com

(801) 373-7888

U.S. Public Sector

Julie Murphy, Sage Communications

beyondtrust@aboutsage.com

(703) 891-5686

France

Eloïse Provino, La Nouvelle Agence

eloise@lanouvelle-agence.com

+33 (0)6 43 68 96 37

Germany

Heiko Scholz, Agentur SCHOLZ PR

beyondtrust@scholzpr.de

+49 (0) 64 51 71 51 05

Asia Pacific

David Bass, Bass Public Relations

david@basspr.com.au

+61 (0) 416 017 194

Lifewire – The Spell Checker in Your Web Browser Could Have Leaked Your Passwords

– ​“Brian Chappell, Chief Security Strategist, EMEA & APAC, at BeyondTrust, says the show password feature on many websites is locally implemented by the site itself. "This isn't a case of Google's Chrome not reacting correctly to a password field, but rather it's the browser reacting correctly to a textbox that hasn't been marked as exempt for spell checking," said Chappell. "Resolving this will lie with each website that's offering this functionality."

Continue Reading

Disruptive Tech Asia – BeyondTrust and NCS Partner to Strengthen Cybersecurity Posture for APAC Organisations

– "From the rise of ransomware to an increased focus on digital transformation and Zero Trust strategies, it is a critical time for organisations to be equipped with solutions that can secure identities, safeguard access for remote employees, and strengthen endpoint security across hybrid environments," said Ben Wong, Director of Channel and Alliance for Asia Pacific & Japan at BeyondTrust. "Through this partnership, BeyondTrust and NCS will enable organisations in Asia Pacific with our Privileged Access Management (PAM) solutions to address these cybersecurity challenges."

Continue Reading

Cybersecurity ASEAN – BeyondTrust and NCS Partner to Strengthen Cybersecurity Posture for APAC Organisations

– BeyondTrust, the leader in intelligent identity and access security, announced today a new strategic partnership with NCS Group, a leading technology services firm that provides services and solutions in consulting, digital, technology, cybersecurity and more. A strong player in identity security, NCS will be using the technology provided by BeyondTrust to offer companies best practice solutions in Privileged Access Management (PAM), a core component of enabling Zero Trust security.

Continue Reading

ITP.net – Uber data breach spotlights need for enterprises to ‘get the basics right’, say experts

– “Attacks, like the one apparently launched on Uber, highlight some key points about a successful cybersecurity strategy,” BeyondTrust’s chief security strategist, EMEA & APAC, Brian Chappell said to ITP.net. “The first is that it’s important that cybersecurity is woven into the fabric of the organisation; it’s a starting point and not an afterthought. It’s also important to accept that technology alone doesn’t solve problems and that poor implementation of technology is likely to return little or, more likely, no value.”

Continue Reading

Arabian Business – Uber launches investigation as teenage hacker breaches network

– "This is a salutary lesson for all organisations in just how important the basics of cybersecurity are," BeyondTrust’s chief security strategist, EMEA & APAC, Brian Chappell told Arabian Business. Chappell said: "You can have the best monitoring tools in the world but they won’t stop a breach. Getting the basics right offers the best chance of stopping a breach before it can cause any significant damage."

Continue Reading

Datatechvibe – How PAW Can Bring Much-needed Safety to The Cloud

– ​The PAW — which can be a physical or virtual machine — is used exclusively for privileged access to the cloud, and the sensitive secrets it holds are far less likely to fall into the wrong hands because users that have access to it while having privileged credentials are only using the machine for one purpose – cloud administration. Even then, users are restricted to a narrow scope of tasks. And if the slim chance of credentials compromise comes to pass, any attempt to use those credentials to access the environment from another workstation (even another PAW) will be an obvious red flag.

Continue Reading

Insurance Business - Which Australian industries are most targeted by cyberattacks?

– “A reliance on firewalls and other on-premise measures are simply insufficient. Home-based workers – thanks to insecure Wi-Fi, unpatched personal devices, and generally poor cyber hygiene – are more susceptible to everything from phishing campaigns to ransomware attacks and more.” These situations, according to Hesford, have pushed cyber insurers to tighten underwriting guidelines and require customers to have certain security controls in place before they can access coverage.

Continue Reading