A Better Mouse Trap

– While some may argue it is more humane to trap and release a mouse versus creating a literal mess of the rodent, the goal is the same: to keep the mouse out of the house. This is a crude analogy for cybersecurity, but it works — you have to consider the appropriate action to keep a threat actor out of your environment. Should you terminate them or practice catch and release? Both have merits, and both have serious concerns that BeyondTrust CTO and CISO covers in this article.

Continue Reading

Windows 10 Migration: Getting It Right

– The transition to Windows 10 doesn't need to be a sprint. BeyondTrust's Kevin Alexandra describes how organizations can still take advantage of the security in Windows 7 while gaining added management flexibility from the newer OS.

Continue Reading

Safeguarding Your Organization from Attacks Via Your Third-Party Vendors

– Realizing that most large organizations today have sophisticated security defenses, bad actors are beginning to target third-party vendors, as a means to gain access to an enterprises’ network. In this article written by Morey Haber, BeyondTrust CTO and CISO, Haber describes how threat actors are exploiting organizations via third parties and what can be done to seal this vulnerability.

Continue Reading