Privileged Attack Vectors: Key Defenses

– Attackers crave insider-level access to IT infrastructure, and to get it, they regularly target insiders - and especially anyone with "super user" or admin-level access - to steal their credentials, says Karl Lankford of BeyondTrust.

The trouble with enterprise IoT and its identity management problem

– The Internet of Things (IoT) encompasses a growing number of connected devices ranging from security cameras to smart thermostats. Many businesses use enterprise-level IoT devices to help workers get things done more efficiently or to assist with meeting facilities management needs. ​But, there's one area where enterprise IoT falls short — identity management ​

64% of UK businesses have suffered an insider breach

– According BeyondTrust’s 2019 Privileged Access Threat Report, 64% of businesses globally believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, and 62% believe they’ve had a breach due to compromised vendor access.

How privileged insiders threaten the security of global organizations

– A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, contractors, and third-party vendors with privileged access to their IT networks.

Majority have suffered employee access breach

– New research has revealed that 64 per cent of businesses globally believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, while 62 per cent believe they’ve had a breach due to compromised vendor access.

Nearly two-thirds of businesses hit by credential abuse

– Most businesses admit to breaches relating to abuse of user credentials, according to a report that highlights cyber hygiene failings in the UK and the importance of greater visibility and integration to cyber defence capability

How to master SIEM in the modern enterprise

– Three security experts, including BeyondTrust's Brian Chappell, share strategies and advice for implementing, managing and perfecting SIEM in the present era.

A Better Mouse Trap

– While some may argue it is more humane to trap and release a mouse versus creating a literal mess of the rodent, the goal is the same: to keep the mouse out of the house. This is a crude analogy for cybersecurity, but it works — you have to consider the appropriate action to keep a threat actor out of your environment. Should you terminate them or practice catch and release? Both have merits, and both have serious concerns that Morey Haber, BeyondTrust's CTO and CISO, covers in this article.

Windows 10 Migration: Getting It Right

– The transition to Windows 10 doesn't need to be a sprint. BeyondTrust's Kevin Alexandra describes how organizations can still take advantage of the security in Windows 7 while gaining added management flexibility from the newer OS.

Safeguarding Your Organization from Attacks Via Your Third-Party Vendors

– Realizing that most large organizations today have sophisticated security defenses, bad actors are beginning to target third-party vendors, as a means to gain access to an enterprises’ network. In this article written by Morey Haber, BeyondTrust CTO and CISO, Haber describes how threat actors are exploiting organizations via third parties and what can be done to seal this vulnerability.

Get To Know: Morey Haber, CTO and CISO at BeyondTrust

– Intelligent CIO sits down with Morey Haber, Beyond Trust CISO and CTO, for a wide ranging Q&A about his advice for people interested in following his path to a CISO role, and the biggest technology and security trends that he sees developing.