Privilege Security for the New Perimeter

By Morey Haber, chief technology officer, BeyondTrust For all of information technology’s benefits, most organizations are well acquainted with the by-product of rapid IT advances and expansion―increased cybersecurity risk. Indeed, growing cybersecurity concerns correlate directly with your organization’s expanding digital universe and the number of people given some level of authority to operate within it. A swiftly expanding digital perimeter—both physical and logical—inevitably makes organizations more vulnerable to the so-called cyberattack chain, regardless of how far the perimeter has extended. The attack process starts with a successful perimeter breach or insider malfeasance, followed by the theft of “privileged” user credentials … Continue reading Privilege Security for the New Perimeter

Effective Incident Response – Practice Makes Perfect

By:  Morey Haber, chief technology officer, BeyondTrust As a security professional, I have seen a wide variety of best practices for incident response. The methodologies vary greatly based on the sensitivity of the data, requirements to notify law enforcement, etc. Best practices recommendations exist from non-profit security organizations through to regulatory compliance initiatives, but all suffer from the same problem—they are painfully too high level to actually execute. Every one of the standards will recommend having an incident response plan, assigning roles and responsibilities, preserving critical log information, notifying law enforcement, and prioritizing restoration of services. Sounds great…but how? Creating … Continue reading Effective Incident Response – Practice Makes Perfect