Security Solutions - BeyondTrust Survey Finds 90% of Australian Enterprises Are Aligning Their Security Programs to the Essential Eight

– Ninety per cent of Australian organisations are planning to align their security programs to the Essential Eight, highlighting its momentum as fast becoming a de facto standard inclusion for cybersecurity strategies across the country. That’s according to a BeyondTrust survey conducted at last month’s AusCERT security conference by

Continue Reading

IT Wire - Australian enterprises taking on the Essentail Eight: survey

– A survey conducted by BeyondTrust at last month’s AusCERT conference has found that ninety percent of Australian organisations plan to align their security programs to the Essential Eight. However, the challenges in aligning with the Essential Eight include application control (63 percent), user application hardening (51 percent), patching (49%), and restricting admin privileges (44 percent).

Continue Reading

CXO DX – Lets take the fight to the identity thieves; introducing ITDR

– “Adoption of ITDR should be undertaken carefully. Because it is more a practice than a product, integration plays a significant role in implementation. Investments can easily be squandered if stakeholders do not pay due attention to the fundamentals. Before any detection or response can take place, organizations must claim back visibility and control of the hardware and software that comprise their identity infrastructure. This visibility and control must also apply to accounts themselves. Security personnel must be able to see at a glance all current access so they can sift out overprivileged accounts.”

Continue Reading

Security MEA – Does ChatGPT Pose Cybersecurity Risks?

– “As an AI language model, ChatGPT has the potential to pose certain security risks, although it’s important to note that these threats are contingent on misuse, not the technology itself,” says Karl Lankford, Regional Vice President, Solutions Engineering, BeyondTrust.”

Continue Reading

CXO Insight ME – De-risking the cloud

– “Every cloud asset needs at least one privileged account at some point in its lifecycle for creation, maintenance, and eventual decommissioning. Many of these privileged accounts are proliferating unseen, unmonitored, and unmanaged, presenting dangerous backdoors to the environment for threat actors. Therefore, asset management for identities and their associated accounts is a critical starting point for getting on top of this risk.”

Continue Reading

CXO Insight ME – Managing Insider Threat

– “By definition, an Insider Threat is an internal personal behaving as a threat actor. Regardless of the techniques they are using, they are not behaving in the best interest of the organization or government, potentially breaking the law, and exfiltrating information they do not have permission to possess,” says Morey Haber, Chief Security Officer, BeyondTrust.”

Continue Reading

ChannelBuzz – BeyondTrust Rolls out Next Generation Partner Program for Deeper Partner Engagement

– “We did a major channel program revision in 2021, but that was about harmonizing the four existing channel programs that had come through M&As,” said Rob Spee, SVP Global Channel & Alliances at BeyondTrust. “I was asked to build a next generation modern partner ecosystem for the cloud SASE era, involving partners who can not only sell but who can land and expand. So we had to expand the program to include different partner types in one program and with one agreement.”

Continue Reading

IT-Administrator – More and More Windows Vulnerabilities (German)

– The number of vulnerabilities in Microsoft systems is at a record high. This is the conclusion reached by BeyondTrust in its latest "Microsoft Vulnerabilities Report". The report is published in its tenth edition and breaks down Microsoft vulnerabilities by product and category. With a total of 1,292 vulnerabilities, this year's report has identified more vulnerabilities in Microsoft systems than ever before. For the third year in a row, elevated user privileges are among the highest security risks.

Continue Reading

ChannelLife UK: BeyondTrust expands Identity & Access Security platform

– "Securing identities and access is critical to combatting today's cyberthreats. We continue to invest in innovation to enable visibility and control of all identities and access pathways, detect advanced identity threats, and automatically remediate gaps and adjust policies," says Marc Maiffret, Chief Technology Officer, BeyondTrust.

Continue Reading

ChannelLife AU: BeyondTrust expands Identity & Access Security platform

– "Securing identities and access is critical to combatting today's cyberthreats. We continue to invest in innovation to enable visibility and control of all identities and access pathways, detect advanced identity threats, and automatically remediate gaps and adjust policies," says Marc Maiffret, Chief Technology Officer, BeyondTrust.

Continue Reading

Datatechvibe – Keep Your Secrets Safe by Combining their Management with PASM

– “There are four main reasons for wanting secrets management packaged with PASM. The first involves discovery and onboarding. If the two functions are part of one platform, visibility gaps are eliminated when trying to bring all the keys to the kingdom together. The second reason for unification is consistency when enforcing security policies. Separate platforms might see one rule for credentials normally managed by IT and another for those managed by security. Oversight of all privileged credentials should occur in a single pane, no matter who the designated overseer may be.”

Continue Reading

CXO DX – Towards stronger passwords

– “Since Covid, we truly have a work-from-anywhere world, and the cloud is ideal for situations when passwords need to be available outside of the organization, across multiple geographical locations, and when on-premise technology is incapable or cost-prohibitive for meeting business objectives and minimizing risk. On Password Management Day, consider the risks of remembering, sharing, documenting, and reusing passwords. Security best practices today have better methods, including password services in the cloud, to minimize the need to remember passwords.

Continue Reading

The Edge Singapore – Going password-less is a matter of (zero) trust

– In this article, Scott Hesford says that organisations need to understand that implementing zero trust is less of a destination and more of a never-ending journey as attackers are constantly finding new ways to attack the network. At the same time, organisations looking to maintain productivity and security need to start preparing for a future where user authentication transcends passwords.

Continue Reading

Channel 360 MEA – Better Be Safe, than Sorry!

– “Our brains are full of passwords and, often, we forget them, need to share them, and are forced to document them using unsecure methods like paper or spreadsheets. These insecure methods for sharing passwords have caused the press to report front page news articles on data breaches and compelled organizations to educate employees on the insecure methods for password storage and sharing. A better method to document passwords is needed that is highly secure, documents distributed access, and promotes sharing and collaboration with minimal risk—no matter where the access occurs.”

Continue Reading

it-daily.net – Study: Total Number of Microsoft Vulnerabilities at an All-Time High (German)

– BeyondTrust released its latest Microsoft Vulnerabilities Report. The tenth edition of the annual security study breaks down Microsoft's vulnerabilities by product and category. For the third time in a row, excessive user privileges are among the highest security risks. With a total of 1,292 vulnerabilities, this year's report has identified more vulnerabilities in Microsoft systems than ever before.

Continue Reading

Silicon.de – Study: Microsoft Vulnerabilities Reach All-Time High (German)

– “Microsoft has a high volume of vulnerabilities that we have seen increase over the last 10 years of our research,” said James Maude, Lead Security Researcher at BeyondTrust. “This report outlines many of the risks, and highlights the importance of timely patching alongside the removal of excessive administrative rights to mitigate the risks.”

Continue Reading

Security-Insider.de – BeyondTrust Microsoft Vulnerabilities Report 2023: Total Number of Microsoft Vulnerabilities Rises to All-Time High (German)

– “Microsoft has a high volume of vulnerabilities that we have seen increase over the last 10 years of our research,” said James Maude, Lead Security Researcher at BeyondTrust. “This report outlines many of the risks, and highlights the importance of timely patching alongside the removal of excessive administrative rights to mitigate the risks.”

Continue Reading

Forbes – Cybersecurity Implications of Juice Jacking for Businesses

– The concern is a cyber-theft tactic called “juice jacking.” Juice jacking is the exploitation of a device using a modified USB cable (dirty USB cable) and/or malware to compromise a device while it is charging. Since USB and Apple Lightning cables contain both power and data connections in the same cable and connector, the exploit leverages the data connections as the device attempts to synchronize data.

Continue Reading

Channel Insider – Privileged Access Management: The Ultimate Guide

– A noteworthy feature of BeyondTrust Password Safe is its SSH key management subsystem. The developers have incorporated secure SSH session keys into the security loop alongside account passwords. This ensures that SSH keys are stored securely and updated automatically. SSH sessions are recorded and logged similarly to sessions using other protocols and can be monitored in real time. Licensing is based on assets, not user count, which further sets it apart.

Continue Reading

IT Brief UK: Operating Models Increasingly Complex, Difficult to Secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. Morey Haber, Chief Security Officer at BeyondTrust, comments, "Today's business operating models are highly complex, with remote employees accessing critical systems using dozens, and even hundreds of applications.

Continue Reading

IT Brief Asia: Operating Models Increasingly Complex, Difficult to Secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. Morey Haber, Chief Security Officer at BeyondTrust, comments, "Today's business operating models are highly complex, with remote employees accessing critical systems using dozens, and even hundreds of applications.

Continue Reading

IT Brief NZ: Operating Models Increasingly Complex, Difficult to Secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. Morey Haber, Chief Security Officer at BeyondTrust, comments, "Today's business operating models are highly complex, with remote employees accessing critical systems using dozens, and even hundreds of applications.

Continue Reading

IT Brief AU: Operating Models Increasingly Complex, Difficult to Secure - BeyondTrust

– The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. Morey Haber, Chief Security Officer at BeyondTrust, comments, "Today's business operating models are highly complex, with remote employees accessing critical systems using dozens, and even hundreds of applications.

Continue Reading

Security Brief UK — Operating models increasingly complex, difficult to secure - BeyondTrust

– The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. Morey Haber, Chief Security Officer at BeyondTrust, comments, "Today's business operating models are highly complex, with remote employees accessing critical systems using dozens, and even hundreds of applications.

Continue Reading

Security Brief Asia — Operating models increasingly complex, difficult to secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The survey's research focused on understanding current identity and zero trust trends, adoption rates, incidents, solutions, challenges, and new areas of focus. The research also investigated the integration requirements and techniques for zero trust solutions and how they interact with other key business applications and systems.

Continue Reading

Security Brief NZ — Operating models increasingly complex, difficult to secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The survey's research focused on understanding current identity and zero trust trends, adoption rates, incidents, solutions, challenges, and new areas of focus. The research also investigated the integration requirements and techniques for zero trust solutions and how they interact with other key business applications and systems. Syndicated to: Security Brief NZ, Security Brief Asia, Security Brief UK

Continue Reading

Security Brief AU: Operating Models Increasingly Complex, Difficult to Secure - BeyondTrust

– BeyondTrust has announced the release of a new global survey, Identity Issues Impact Zero Trust Effectiveness. The survey's research focused on understanding current identity and zero trust trends, adoption rates, incidents, solutions, challenges, and new areas of focus. The research also investigated the integration requirements and techniques for zero trust solutions and how they interact with other key business applications and systems.

Continue Reading

Swiss IT Reseller: BeyondTrust Appoints Jens Brauer

– Specializing in identity and access security solutions, BeyondTrust wants to expand its sales efforts and intensify its channel-first strategy. To this end, Jens Brauer has been welcomed on board as the new head of the DACH and Eastern Europe business. "Expanding our close cooperation with system houses and resellers will be crucial in order to jointly address the opportunities and challenges in a fast-growing and lucrative market segment," said Brauer.

Continue Reading

KBI Media – BeyondTrust Global Survey Provides Insights on Identity Issues Impacting Zero Trust Effectiveness

– BeyondTrust has announced the release of a new global survey, “Identity Issues Impact Zero Trust Effectiveness.” The survey’s research focused on understanding current identity and zero trust trends, adoption rates, incidents, solutions, challenges, and new areas of focus. The research also investigated the integration requirements and techniques for zero trust solutions and how they interact with other key business applications and systems.

Continue Reading

IT Wire – BeyondTrust Report Shows Frequency of Identity Incidents and Importance of Zero Trust Integration

– BeyondTrust's Identity Issues Impact Zero Trust Effectiveness survey found identity-related incidents are commonplace. Responses from more than 300 security teams, IT professionals, and executives in five continents revealed that 93 percent had an identity-related incident in the last 18 months, with 81 percent having at least two such incidents. More than 70 percent were still in the process of implementing a zero trust approach, and nearly all companies were using multiple vendors and products in their zero trust strategy.

Continue Reading

ChannelPartner – Focus on Channel First Strategy: Jens Brauer New Head of Sales at BeyondTrust (German)

– As Vice President CEE, Jens Brauer leads the business in the DACH region and Eastern Europe at BeyondTrust, a provider of identity and access security. "In particular, my personal emphasis is on intensifying BeyondTrust's channel-first strategy," emphasized Brauer. "Expanding our close cooperation with system houses and resellers will be crucial in order to jointly address the opportunities and challenges in a fast-growing and lucrative market segment."

Continue Reading

Find Biometrics – Maine Considers the BIPA Option: Identity News Digest

– Three more of BIO-key’s clients have opted to migrate their on-premises deployments of the company’s PortalGuard identity and access management solution to the cloud-based version, PortalGuard IDaaS. “In the cloud, IT leaders can easily right-size computing resources according to unique business requirements and cut wasteful spending,” explained BIO-key’s PortalGuard President, Mark Cochran. The news comes after IAM specialist BeyondTrust added PortalGuard to its Privileged Remote Access solutions portfolio last month.

Continue Reading

Dark Reading – Are Low-Code Apps a Ticking Access Control Time Bomb?

– And as he puts it, this is a feature that low-code development platforms are proud of and actively marketing because they enable productivity. But obviously from a security perspective it can quickly turn into a nightmare. It could undermine the integrity of role-based access controls, throw off user and entity behavioral analytics, and create huge compliance risks in the future, says Morey Haber, CSO for privileged access management firm BeyondTrust.

Continue Reading

Intelligent CISO – BeyondTrust Launches Zero Trust Authentication and Zero Trust Leadership Series of Events

– Bringing together industry-leading security technologies and integrators, Beyond Identity, Palo Alto Networks, CrowdStrike, Optiv, World Wide Technology, Guidepoint Security, BeyondTrust, Ping Identity and Climb Channel Solutions will enable organisations to move towards secure authentication designed to advance the Zero Trust strategies of global 5000 companies.

Continue Reading

CXO Insight ME: Do you trust your cloud?

– “Christopher Hills, Chief Security Strategist, BeyondTrust, says cloud mis-configuration or lack of configuration is still the leading attack vector. “That being said, there are many other element related to cloud breaches such as malicious insider, vulnerabilities, phishing access via social engineering, and lets not forget the leading cause of breaches in general, stolen and/or compromised credentials.”

Continue Reading

Becker’s Hospital Review – 121 Healthcare Cybersecurity Companies to Know | 2023

– BeyondTrust delivers cybersecurity solutions designed to reduce risks and act against internal and external data breach threats. The company offers an integrated risk intelligence platform to identify critical risks and provide information for the company. In the healthcare space, BeyondTrust's PowerBroker privileged account management solution enforces best practices; its Retina vulnerability management solutions allows the healthcare IT security team to identify exposure, analyze the business impact and conduct remediation.

Continue Reading

Security Review – The 5 Ways PAM Reduces Unix/Linux Attack Surfaces and Improves Compliance

– “The bottom line is that your business depends on the accuracy and privacy of the information you are entrusted with. Therefore, the value of managing the “who, what, where, when, how, and why” regarding access to your information technology cannot be underestimated. Privileged access management has numerous benefits that can solidify your information security. You would be wise to take advantage of this indispensable tool.”

Continue Reading

Bernama – 2023 Microsoft Vulnerabilities report reveals elevation of privilege as top vulnerability category

– The 2023 Microsoft Vulnerabilities Report released by BeyondTrust, the worldwide leader in intelligent identity and access security, has found that elevation of Privilege is the top vulnerability category for the third consecutive year. The report said that total Microsoft vulnerabilities rose to 1,292 hitting an all-time high since the report ten years ago.

Continue Reading

TechWire Asia – Can Microsoft Security Copilot provide better cybersecurity insights and fix vulnerabilities?

– Despite Microsoft’s advancements and the recent introduction of Microsoft Copilot, what hasn’t changed is vulnerabilities. BeyondTrust has unveiled the 2023 Microsoft Vulnerabilities Report. Celebrating its 10th anniversary, the report offers insights into the Microsoft vulnerability landscape. The report analyzes 2022 Microsoft vulnerabilities, emphasizing trends and prominent CVEs while detailing attacker exploitation methods and suggesting prevention or mitigation strategies.

Continue Reading

Economy ME – Businesses must brace for AI-powered attacks

– “In their recent cyberthreats report, Acronis predicts that artificial intelligence (AI) and machine learning (ML) will help fuel identity fraud and disinformation campaigns in the not so distant future. Christopher Hills, Chief Security Strategist, BeyondTrust believes that while AI isn’t yet capable enough to learn and replicate human behavior, recent advancements have put it to interesting use cases such as correctly predicting medical conditions based on symptoms. “Granted this is a good thing, but in the hands of a threat actor, AI could easily be leveraged for nefarious purposes,” warns Hills.”

Continue Reading

CRN – 2023 Partner Program: BeyondTrust: Designated 5-Star Award Recipient

– What are the most significant changes made to your partner program over the past year? We increased our focus on Service Delivery Partners (SDP) by establishing a Partner Success Organization charged with enabling partners to increase margins via implementation and other services. In addition, we added SDP, MSP and GSI tracks to our global partner program.

Continue Reading

Tech Trade Asia – BeyondTrust's new report discusses risks and mitigation for Microsoft vulnerabilities

– BeyondTrust, the worldwide provider of intelligent identity and access security, has released its 2023 Microsoft Vulnerabilities Report. Produced annually by BeyondTrust, the report analyses data from security bulletins publicly issued by Microsoft throughout the previous year. This 10th anniversary edition covers a decade of vulnerability insights, providing information to help organisations see into the past, present, and future of the Microsoft vulnerability landscape.

Continue Reading

Cybersecurity ASEAN – Elevation of Privilege remains #1 in BeyondTrust 10th Annual Microsoft Vulnerabilities Report

– BeyondTrust has announced the release of the 2023 Microsoft Vulnerabilities Report. This report is the 10th anniversary edition and covers a decade of vulnerability insights, providing valuable information to help organizations see into the past, present, and future of the Microsoft vulnerability landscape. Produced annually by BeyondTrust, The Microsoft Vulnerabilities Report analyzes data from security bulletins publicly issued by Microsoft throughout the previous year.

Continue Reading

Connect Channel — BeyondTrust: Access to Infrastructure and Integrated Secrets Management (German)

– BeyondTrust released new versions of BeyondTrust Privileged Remote Access and Password Safe which are available as a bundle. These releases offer expanded capabilities for developers, cloud ops and other technical staff to secure and manage access to critical systems in a user-friendly and efficient way. The solutions provide robust infrastructure access capabilities designed for modern cloud-native environments. These Privileged Remote Access and Password Safe releases advance capabilities beyond traditional PAM solutions.

Continue Reading

BioMetric — BIO-key, BeyondTrust team up to offer biometrics to improve remote access security

– BIO-key International, Inc., a provider of identity and access management solutions featuring ‘Identity-Bound Biometrics,’ has announced it is integrating its PortalGuard IDaaS platform with BeyondTrust, an intelligent identity and access security provider. The companies say this partnership between the two companies will provide improved remote access security and assurance that only authorized users can access essential systems, data and applications.

Continue Reading

IT Brief UK — BeyondTrust named one of the 'hottest privately held cybersecurity vendors'

– BeyondTrust, the intelligent identity and access security specialist, has announced that it has been named to JMP Securities Cyber 66. Janine Seebeck, CEO at BeyondTrust, says, "We are excited to be recognised by JMP Securities as a market-leading cybersecurity company addressing today's rapidly evolving threat landscape, which is creating a new urgency to achieving cybersecurity goals. BeyondTrust protects identities and critical access from security threats while creating operational efficiencies."

Continue Reading

IT Brief Asia — BeyondTrust named one of the 'hottest privately held cybersecurity vendors'

– BeyondTrust, the intelligent identity and access security specialist, has announced that it has been named to JMP Securities Cyber 66. Janine Seebeck, CEO at BeyondTrust, says, "We are excited to be recognised by JMP Securities as a market-leading cybersecurity company addressing today's rapidly evolving threat landscape, which is creating a new urgency to achieving cybersecurity goals. BeyondTrust protects identities and critical access from security threats while creating operational efficiencies."

Continue Reading

CXO DX – Towards cyber discipline

– A traditional Security Operations Center (SOC) is no longer a necessity in any enterprise or business. While some verticals would argue a centralized security model is necessary to monitor and manage threats, many organizations have taken this concept and adapted it to accommodate remote workers, managed services, and even blended the requirements with cloud, network, and other operations teams to manage environments holistically.

Continue Reading

GlobeNewswire - BIO-key and BeyondTrust Announce Integrated Partnership to Offer Identity-Bound Biometrics to Enhance Security for Privileged Remote Access

– BIO-key’s PortalGuard, integrated with BeyondTrust’s Privileged Remote Access solution that controls, manages, and audits the access of privileged employees, vendors, developers, and cloud ops engineers, now offers BeyondTrust customers a wide range of flexible authentication options, including Identity-Bound Biometrics (IBB).

Continue Reading

The Integrator – WiT – BeyondTrust

– Yasmine Sameh, Program Manager at BeyondTrust – In my role as a Program Manager at BeyondTrust, I’m responsible for managing a team of Implementation Managers/Project Managers and I’m also working on delivering complex programs/projects in EMEA region. I started my career in the Tech Industry in 2011, focusing on the data storage management projects for 6 years, then networking/telecommunications for 3 years and in 2020 I decided to explore cybersecurity because it is vital element of every successful program delivery to any organization.”

Continue Reading

IT Wire – Dealing with the shadow IT rebound

– In this byline opinion article, Scott Hesford discusses how organisations needs to understand what shadow IT is and the risks it represents before finding a path forward to mitigating its potential impact on an enterprise.

Continue Reading

ZDNET - Top 15 Password Management Best Practices (French)

– Nobody likes passwords, but we'll have to deal with it. Because, despite the predictions, the password is not dead. Attempts to replace it with biometric data, such as with facial recognition technology and fingerprints, have not been entirely satisfactory, so many are reverting to the good old (admittedly frustrating) password.

Continue Reading

Dynamic Business - Exclusive: Australian privacy reform gathers momentum with new report

– This article on Australia’s pending Privacy Act Reform includes comment from Scott Hesford who suggests that Australia may not need to write an entirely fresh collection of legally binding cybersecurity requirements for holding Personally Identifiable Information but we do need to ensure that we’re holding that data under the appropriate settings in accordance with recognised strategies such as the ASD Essential Eight.

Continue Reading

Security Brief NZ – BeyondTrust improves its privileged access management bundle

– BeyondTrust has announced new releases of its Privileged Remote Access and Password Safe and the availability of both products in a new bundle with value pricing. These releases introduce new, expanded capabilities for developers, cloud ops and other technical staff to secure and manage access to critical systems in a way that doesn't sacrifice ease of use or efficiency.

Continue Reading

Security Brief AU – BeyondTrust improves its privileged access management bundle

– BeyondTrust has announced new releases of its Privileged Remote Access and Password Safe and the availability of both products in a new bundle with value pricing. These releases introduce new, expanded capabilities for developers, cloud ops and other technical staff to secure and manage access to critical systems in a way that doesn't sacrifice ease of use or efficiency.

Continue Reading

Help Net Security – Video Walkthrough: Cybertech Tel Aviv 2023

– Help Net Security is in Israel for Cybertech Tel Aviv 2023, talking to the key players from the cybersecurity industry - like BeyondTrust - and businesses from a wide range of sectors, who gathered to exchange knowledge, to network, and learn about technological innovations and solutions for combating cyber threats.

Continue Reading
Prefers reduced motion setting detected. Animations will now be reduced as a result.