BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address...
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their methodology...
Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, there are a lot of bad guys out there who know the answer to that question. They are waiting to take advantage of the situation and...
Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, which could easily lead to significant information falling into the wrong hands. This is true both for our personal information as well as for confidential company information....
When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding world of computer security, digital forensics is playing an ever-increasingly important role alongside security intelligence gathering. Ondrej Krehel founded LIFARS in 2013, after spending many years analyzing, preventing, and...
Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security threats. What they are often lacking, however, is enough trained security personnel to execute the necessary actions. What they are really lacking is time – and when it comes to responding to...
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by malware....
The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizations have proportionately smaller security budgets for technology and expert security staff making it very challenging. That is why turning to a proven managed security services provider (MSSP) becomes an attractive option. In my...
No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google search for the term can return an overwhelming amount of information, not all of which is 100% accurate. Furthermore, many of the popular definitions that are returned...
It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as established enterprise developers. The developers that incorporate these open source components need to somehow stay on top of the many licensing issues and security vulnerabilities...