Top Cybersecurity Trends to Watch for 2021

What new cybersecurity trends, threats, and events can we expect to emerge in 2021 and beyond? Before we go there, let’s consider what we have learned now that 2020 is winding down. BeyondTrust’s annual cybersecurity predictions are projections of possibilities we see emerging based on shifts in technology, threat actor habits, and culture. However, sometimes the most impactful trends materialize completely out of left field. We have all been reminded and humbled...

Read More

Privileged Threats & the Top-6 Privileged Access Security Priorities

Privileges facilitate essential operational functions across an enterprise, enabling users, applications, and system processes elevated rights to access specific resources and complete work-related tasks. Yet, the potential for misuse or abuse of privilege by insiders, malware, and external threat actors presents considerable cyber risk that is inadequately managed across many organizations. Forrester Research estimates that 80% of security breaches involve privileged credentials (passwords, tokens, keys, and certificates.). Consider for a moment all the places where...

Read More

Netflix Breach: Orange, Black, and Another Hack

How much would your organization pay in ransom to stop the early release of its intellectual property? Can you place a monetary value on a breach of this type? In the case of the weekend Netflix breach notification, they paid nothing. Does the breach of an entirely new season of Orange is the New Black actually hurt Netflix, or does it provide a low cost, unintentional and extreme promotion for one...

Read More

Can We Take It With Us to the #Cloud?

As more organizations move to the cloud, security professionals are coming to a number of hard realizations, and quickly. First, saying “no” to the cloud is NOT happening. What IS happening is moving to the cloud, so get over it. Second, cloud providers are secretive, scheming Illuminati types that hide things from us. OK, I made up that second one, but it sometimes feels this way based on the paucity of...

Read More
IoT Bots Cause Massive Internet Outage October 21st, 2016

IoT Bots Cause Massive Internet Outage October 21st, 2016

The real perpetrator of the widespread Internet outage on Friday, October 21, 2016 is still not known but the weapon of choice was definitely IoT devices compromised with Mirai malware. The Distributed Denial of Service (DDoS) attack that started on the East coast of the United States targeted DNS provider Dyn, and appears to have comprised 10% of IoT assets participating in the botnet. Scale of Attack Could Have Been Larger The command...

Read More

PowerBroker Password Safe API is Available to Developers – for Free

Calling all vendors, end users, and application developers! BeyondTrust is now offering a free method to make all of your solutions more secure if you require a user or application to provide credentials for connectivity or authentication. BeyondTrust’s PowerBroker Password Safe – the overall leader in Forrester’s 2016 Privileged Identity Management (PIM) Wave – is the only solution to make password storage available for application developers and users for free through...

Read More

Phishing Attacks – Overcoming Bad User Behavior

This is gold! Big thanks to BeyondTrust for articulating phishing attacks, and how often and easy they occur! No, no we are not talking about a wild attack between a fish and a man on a boat, we're talking malicious email scams in attempt to steal your personal data phishing! Still confused, read our blog here before continuing below! We have all heard these clichés: “Curiosity Killed the Cat,” “Nothing Bad Will...

Read More
Is Vulnerability Management Still a “B” Horror Movie?

Is Vulnerability Management Still a “B” Horror Movie? via BeyondTrust

Here we are in 2016, and the state of information security (specifically the lack thereof) feels more like a bad Toxic Avenger sequel than a box office blockbuster. We’ve had major breaches, huge failures,  significant doubt, speculation about new technologies being inherently insecure, and plenty more. Crazy as it seems, many seasoned security professionals are actually experiencing “breach weariness” – how in the world did this happen? Even though we’ve been...

Read More