SF Business Times – It Can Happen to Twitter…It can Happen to You

– “In the case of Twitter, they are the victim and the FBI is exploring two angles: 1) the attack itself and who has access to sensitive resources that could be maliciously used in the future; 2) The victims that had bitcoin postings on their accounts that were allegedly secured and verified. Both could have legal ramifications for Twitter and obstructing the investigation will not improve security, processes, and platform trust for anyone,” said Morey Haber, chief technology officer and chief information security officer for BeyondTrust, based in Atlanta, GA.

Continue Reading

2020 Vendors to Know: Privileged Access Management

– BeyondTrust enhanced its privileged access protections and received attention from KuppingerCole. In 2020, it appeared as a Leader in the KuppingerCole Leadership Compass for PAM. Previously, BeyondTrust was named a Leader in the Forrester Wave for Privileged Access Management in 2018 and in the first Gartner Magic Quadrant for Privileged Access Management. Recently, it announced its Windows and Mac offerings are available via SaaS.

Continue Reading

IP-Insider: Microsoft Vulnerabilities Report 2020: More Security With Fewer Admin Rights

– In its latest Microsoft Vulnerabilities Report 2020, security firm BeyondTrust shows that 77 percent of critical Microsoft security vulnerabilities could be mitigated by the removal of admin rights. Last year, 77 percent of critical vulnerabilities in Microsoft's operating systems and applications would have been manageable by removing administration rights, according to BeyondTrust.

Continue Reading

CXO Insight Middle East: The Journey to Universal Privilege Management

– Many PAM tools lack the ability to extend granular privileged access controls to non-traditional endpoints, such as medical or industrial-connected devices and control systems. Organisations need a solution that delivers the capability of least privilege to those endpoints by allowing fine-grained control over the commands sent and the responses received over SSH sessions.

Continue Reading

Business Transformation: Why working from home is a tremendous stress test

– In haste, many organizations may have remote workers and vendors VPN into the corporate network, but VPNs are not ideal. First, they lack the scalability needed to accommodate a surge of remote workers. And, perhaps more concerning, is that the VPN technology, while providing some protections (such as against man-in-the-middle attacks), itself suffers many security shortcomings.

Continue Reading